Start a conversation

Coinify Responsible Disclosure Policy

At Coinify, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present.

If you discover a vulnerability, we would like to know about it so we can take steps to address it as quickly as possible. We would like to ask you to help us better protect our clients and our systems.

Please do the following:

  • E-mail your findings to Encrypt your findings using our PGP key to prevent this critical information from falling into the wrong hands,

  • Do not take advantage of the vulnerability or problem you have discovered, for example by downloading more data than necessary to demonstrate the vulnerability or deleting or modifying other people’s data,

  • Do not reveal the problem to others until it has been resolved,

  • Do not use attacks on physical security, social engineering, distributed denial of service, spam or applications of third parties, and

  • Do provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible. Usually, the IP address or the URL of the affected system and a description of the vulnerability will be sufficient, but complex vulnerabilities may require further explanation.

What we promise:

  • We will respond to your report within 5 business days with our evaluation of the report and an expected resolution date,

  • If you have followed the instructions above, we will not take any legal action against you in regard to the report,

  • We will handle your report with strict confidentiality, and not pass on your personal details to third parties without your permission,

  • We will keep you informed of the progress towards resolving the problem,

  • In the public information concerning the problem reported, we will give your name as the discoverer of the problem (unless you desire otherwise), and

  • As a token of our gratitude for your assistance, we offer a reward for every report of a security problem that was not yet known to us.

  • The amount of the reward will be determined based on the severity of the leak and the quality of the report. The minimum reward will be a €50 gift certificate.

In Scope

The program scope covers all software vulnerabilities in services provided by Coinify. Any design or implementation issue that is reproducible and substantially affects the security of Coinify users is likely to be in scope for the program. Common examples include:

  • Injections

  • Cross Site Scripting (XSS)

  • Cross Site Request Forgery (CSRF)

  • Remote Code Execution (RCE)

  • Shell Upload vulnerabilities (only upload basic backend script that just prints some string, preferably try printing the hostname of the server and stop there!)

  • Authentication/Authorisation flaws

  • Domain take-over vulnerabilities

  • Able to take-over other Coinify user accounts (while testing, use your own another test account to validate)

  • Any vulnerability that can affect the Coinify brand, user data and financial transactions

When in doubt, consider what an attack scenario would look like. How would the attacker benefit? What would be the consequence to the victim?

Specific domains hosting Coinify services are provided below:

* (All assets on and subdomains, excepting services provided by third parties, see below)

Out of Scope

All vulnerabilities that require or are related to the following are out of scope:

  • Issues found through automated testing

  • "Scanner output" or scanner-generated reports

  • Social engineering

  • Physical security

  • Non-security-impacting UX issues

  • SPF and DKIM issues

  • Content injection

  • Hyperlink injection in emails

  • IDN homograph attacks

  • RTL Ambiguity

  • Issues relating to Password Policy

  • Clickjacking on pre-authenticated pages, or the non-existence of X-Frame-Options, or other non-exploitable clickjacking issues (An exploitable clickjacking vulnerability requires a) a frame-able page that is b) used by an authenticated user and c) which has a state-changing action on it vulnerable to clickjacking/frame re-dressing)

  • CSRF-able actions that do not require authentication (or a session) to exploit

  • Reports related to the following security-related headers:

    • Strict Transport Security (HSTS)

    • XSS mitigation headers (X-Content-Type and X-XSS-Protection)

    • X-Content-Type-Options

    • Content Security Policy (CSP) settings (excluding nosniff in an exploitable scenario)

  • Bugs that do not represent any security risk - these should be reported to

  • The subdomains www, help, status

  • Distributed Denial of Service attacks (DDoS)

  • Brute Force attacks

  • Vulnerabilities or weaknesses in third party applications that integrate with Coinify

  • Ability to abuse existing banking functionality such as ACH or credit card chargebacks

If you feel that a particular asset or activity not mentioned here should be in scope, please submit a report along with a brief description of why you believe that the asset should be covered by this scope.

Choose files or drag and drop files
Published Date = 02/08/2019
Last Updated Date = 02/08/2019
Was this article helpful?