Friendium Bug Bounty & Vulnerability Disclosure Policy

This Bug Bounty & Vulnerability Disclosure Policy defines how Friendium receives, evaluates, and responds to security vulnerability reports. It establishes responsible disclosure expectations, researcher protections, and enforcement boundaries to safeguard users, infrastructure, and Nexa-Group.

1. Purpose & Security Philosophy

Friendium recognizes the importance of independent security research in identifying vulnerabilities before they can be exploited. This policy provides a structured and lawful pathway for reporting security issues while protecting both users and researchers.

2. Scope of Disclosure

This policy applies to vulnerabilities affecting Friendium-operated domains, applications, APIs, infrastructure, and services owned or controlled by Nexa-Group.

  • friendium.com and official subdomains
  • Official mobile and web applications
  • Authentication, session, and identity systems
  • APIs, backend services, and supporting infrastructure

3. Eligible Vulnerability Categories

Reportable vulnerabilities include, but are not limited to:

  • Authentication or authorization bypass
  • Account takeover vectors
  • Data exposure or leakage risks
  • Privilege escalation flaws
  • Remote code execution
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)
  • Infrastructure misconfiguration

4. Excluded Findings

The following are generally excluded from bounty eligibility, though they may still be acknowledged:

  • Issues requiring physical access to user devices
  • Denial-of-service testing without authorization
  • Social engineering of users or employees
  • Spam, brute-force, or credential-stuffing attacks
  • Outdated browser or OS-specific issues
  • Theoretical vulnerabilities without proof of impact

5. Responsible Disclosure Requirements

Researchers must adhere to responsible disclosure principles:

  • Do not exploit vulnerabilities beyond proof-of-concept
  • Do not access or modify user data
  • Do not disrupt services or degrade availability
  • Allow Friendium reasonable time to remediate
  • Do not publicly disclose without written authorization

6. Safe Harbor for Good-Faith Research

Friendium commits to not pursuing legal action against researchers who comply with this policy, act in good faith, and avoid harm to users or systems.

This safe harbor does not apply to malicious activity, data misuse, extortion, or violations of applicable law.

7. Reporting Process

Vulnerabilities must be reported with sufficient detail to enable reproduction and assessment.

  • Clear description of the issue
  • Steps to reproduce
  • Affected systems or endpoints
  • Potential impact assessment
  • Proof-of-concept (if applicable)

8. Submission Channels

Security reports should be submitted via:

  • Email: security@friendium.com
  • Subject line: “Security Vulnerability Disclosure”

9. Acknowledgment & Triage

Friendium aims to acknowledge reports within a reasonable timeframe. Reports are triaged based on severity, exploitability, and potential impact.

10. Remediation & Resolution

Confirmed vulnerabilities are prioritized for remediation according to internal risk classification frameworks. Fix timelines may vary based on complexity and systemic risk.

11. Bug Bounty Rewards

Where applicable, Friendium may offer discretionary rewards for qualifying reports. Reward amounts depend on:

  • Severity and impact
  • Originality of discovery
  • Quality of report
  • Adherence to responsible disclosure

All rewards are discretionary and subject to eligibility review.

12. Confidentiality & Attribution

Researchers must keep vulnerability details confidential until remediation is complete. Public attribution may be granted with mutual consent.

13. Abuse & Disqualification

Friendium reserves the right to disqualify reports involving:

  • Unauthorized data access
  • Extortion or ransom demands
  • Violation of user privacy
  • Intentional service disruption

14. Legal & Regulatory Alignment

Vulnerability handling aligns with global security standards, privacy regulations, and Nexa-Group compliance obligations.

15. Policy Updates

This policy may be updated as security practices evolve. Continued research activity constitutes acceptance of the current policy version.

16. Contact

Security Team: security@friendium.com
Legal Inquiries: legal@friendium.com

Ha estat útil la resposta? 0 Els usuaris han Trobat Això Útil (0 Vots)