We value the security community. Report vulnerabilities responsibly and we'll work with you.
Third-party services, social media accounts, and physical infrastructure are out of scope.
If you conduct security research in accordance with this policy, we will consider your research authorized and will not pursue legal action. We will work with you to understand and resolve the issue quickly.
This commitment aligns with the U.S. Department of Justice policy regarding charging violations of the Computer Fraud and Abuse Act (revised May 2022), which recognizes that good-faith security research should not be prosecuted. We also support the principles outlined in the DOJ’s Framework for a Vulnerability Disclosure Program and ISO/IEC 29147:2018 (Vulnerability Disclosure).
DMCA Safe Harbor: We will not bring a Digital Millennium Copyright Act (17 U.S.C. § 1201) claim against researchers who circumvent technological measures solely for the purpose of identifying and reporting vulnerabilities in our platform in accordance with this policy. If a third party initiates legal action against a researcher for activities conducted in compliance with this policy, we will take steps to make it known that the researcher’s actions were authorized by FindTheBreach.
We offer recognition and rewards based on severity:
Actual reward amounts are determined based on impact severity, exploitation complexity, report quality, and whether the vulnerability was previously known. Qualifying reports that meet our Rules of Engagement will always receive at least the minimum amount for their severity tier.
Find The Breach follows a coordinated vulnerability disclosure process aligned with ISO 29147 and CERT/CC guidelines:
We request that reporters refrain from publicly disclosing vulnerability details until the agreed disclosure date or until a fix has been deployed, whichever comes first.
Find The Breach adheres to the following ethical principles in handling vulnerability data discovered through our platform:
Report vulnerabilities to security@findthebreach.com. For PGP-encrypted communication, request our public key at the same address.