Hari Iyer | SyncEzy

Hari Iyer | SyncEzy

CEO
  • Reading Icon 5 Min Read
  • Reading Icon Jul 15, 2024
SyncEzy-Bug-Bounty-Program

SyncEzy Bug Bounty Policy

At SyncEzy, we take the security and reliability of our integrations seriously. We value the efforts of the security research community in helping us maintain high standards of security. If you discover a vulnerability in our systems, we encourage you to report it to us so we can address it promptly. As a token of our appreciation, we offer rewards for valid reports that help improve our services.

Reporting Guidelines:

  • Submission: Send a detailed bug report to security [ at ] syncezy [ dot ] com.
  • Report Content: Ensure that your report is clear and detailed, including:
    • Steps to reproduce the issue.
    • Proof of concept.
    • Relevant screenshots, videos, or logs.
    • Examples of downstream impacts.
    • Explanation of how this works, possible effects and downsides
    • Explanation of how you found this issue ?
    • Your / Organisation’s Genuine name as it would be on the invoice at payment stage.
  • Restrictions:
    • Do not exploit the vulnerability beyond what is necessary to demonstrate its existence.
    • Do not Upload random images or data, capturing images, or anything that damages the SyncEzy brand or assets.
    • Do not violate the privacy of our users, disrupt our services, or destroy any data. 
    • Doing any of the above will result in disqualification from the bounty program as you are no longer an ethical hacker if you are causing damage.
    • Duplicate reports will not be paid. If multiple reports for the same issue are received, only the first submission will be eligible for a reward. Subsequent reports, even if they provide additional information, will not qualify for payment.
    • Public disclosure of vulnerabilities will not be paid. Bugs should only be reported directly to us and not shared publicly, including on social media, forums, blogs, or with any media outlets. Disclosing vulnerabilities to any public platform or third-party before allowing us to address the issue will disqualify the report from receiving a bounty.
  • Eligibility:
    • Minor issues or spurious reports that do not pose a significant risk will not be eligible for rewards.
    • The decision of SyncEzy management on the severity of the bug report is final.
    • Bounties are only paid for P1, P2, and P3 bugs with clear and full disclosure. For P3 issues and lower, the bounty is at the discretion of the SyncEzy team.
    • Reports on the SyncEzy.com WordPress site, contact forms, chatbot inputs, and other basic errors do not qualify for the bug bounty.
    • Do NOT Start chats on the chatbot, contact support staff, or send emails / Linked in messages to SyncEzy team members. The right team will communicate with you through the ticket.
    • Report only genuine security issues, Do not report issues like SPF records, typos, supposed ways business logic could be different, for example phone number validation by OTP, etc. The system is designed to suit our and our customer’s business needs.
  • Program Scope: The bug bounty program aims to make our integration platform secure. Reports not directly related to this will not qualify for the bounty.
  • Authority: SyncEzy reserves the right to decide what qualifies as a bug for the program. Our team’s decision on the reports is final. We will make these decisions in line with the policy described above. We may change the reward or the policy as required by the business.

Exclusions:

  • SyncEzy.com WordPress site.
  • All standard WordPress-based vulnerabilities.  SyncEzy.com is a wordpress site.
  • Basic issues like typos and non-critical subdomains.

After You Report:

Acknowledgment & Response limitations:

  • You will receive an automated email acknowledging receipt of your report with a Ticket Number.
  • We will only contact reporters of P1 or P2 level serious vulnerabilities. Confirmation of these genuine issues will be sent within 2 weeks of ticket submission.
  • Please refrain from sending multiple reminders or starting different email threads asking for an update. If the ticket is a genuine issue and classified as P1 or P2, you will hear back from our team within 2 weeks for further communication and a request for an invoice.
  • For all other submissions, you will receive an automated confirmation of ticket closure.
  • Response Time: Please allow 2 weeks for us to respond. Do not contact the team on LinkedIn or via direct emails to follow up on the issue; we will communicate with you directly via the ticket.
  • Acknowledgment of Valid Reports: All valid reports will be acknowledged with the severity and payment amount within 4 weeks of invoice.  
  • Bounty Payment: For qualified reports, the payment will be made in the currency of your choice to a local bank account or PayPal as required. You may be required to provide an invoice with details. From the time an invoice is provided payment will be in the next payment cycle usually within 30 days.

Reward Structure:

P1 (Priority 1) : US$100 Reward

Critical vulnerabilities that require immediate attention and fixing. These vulnerabilities can lead to severe impact on confidentiality, integrity, and availability of the system.

  • SQL Injection
  • Remote Code Execution
  • Authentication Bypass
  • Privilege Escalation
  • Sensitive Data Exposure (e.g., unencrypted sensitive data in transit)
  • Critical Broken Access Control
  • Severe Command Injection
  • Critical Insecure Deserialization

P2 (Priority 2) : US$50 Reward

High-priority vulnerabilities that should be addressed promptly but are not as urgent as P1. These can still have significant impacts if exploited but might require more specific conditions to exploit.

  • Stored Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Security Misconfiguration (e.g., default passwords, misconfigured permissions)
  • Insufficient Logging and Monitoring (in critical systems)
  • Sensitive Data Exposure (e.g., weak encryption)
  • Insecure Direct Object References (IDOR)
  • Reflected Cross-Site Scripting (XSS)

P3 (Priority 3) : US$25 Reward

Moderate and low-priority vulnerabilities that still need to be addressed but are less likely to cause significant harm. These issues might have a lower impact or be harder to exploit.

  • DOM-based Cross-Site Scripting (XSS)
  • Minor Security Misconfigurations
  • Information Disclosure (e.g., detailed error messages)
  • Weak Password Policies
  • Improper CORS Configuration
  • Insufficient Logging and Monitoring (in non-critical systems)
  • Use of Components with Known Vulnerabilities (non-critical components)
  • Business Logic Vulnerabilities (with limited impact)

Thank you for helping us keep SyncEzy secure!

Author

Hari Iyer | SyncEzy
Hari Iyer | SyncEzy
CEO

Hari Iyer is the Founder and CEO of SyncEzy, a pioneering company at the forefront of data integration and automation solutions. With a deep understanding of the power of technology and a passion for solving complex business challenges, Hari has emerged as a visionary leader in the industry. His relentless pursuit of excellence and commitment to delivering tangible results have earned SyncEzy a loyal global clientele.

He is not only a successful entrepreneur but also an active contributor to the technology community, sharing his insights through thought leadership articles, speaking engagements, and mentorship programs. Hari’s ability to navigate the complexities of remote work serves as an inspiration for leaders, highlighting the importance of flexibility, work-life balance, and a results-oriented approach in today’s evolving work landscape.

Under his guidance, SyncEzy has gained widespread recognition for its deep integration solutions that seamlessly connect software applications, eliminate data silos, and enhance operational efficiency.

When not working, Hari is trying to be a better father, reading tech news, playing FPS games, and not exercising as he should.