CodeRabbit is committed to ensuring the security of our systems and protecting our users' data. We welcome security researchers to responsibly disclose any security vulnerabilities they discover.
Scope of Systems
This Policy covers all internet-facing information systems, applications, or websites owned, operated, or controlled by us, including any web or mobile applications hosted on those websites, including the CodeRabbit domain and related subdomains (collectively, “Information Systems”).
This Policy also does not cover any information systems, websites, or applications that are owned, operated, or controlled by any third party, including any service provider or contractor to the Company, even where under an CodeRabbit domain. You should comply with the responsible disclosure efforts for those other systems, websites, and applications.
Scope of Vulnerabilities
This Policy covers technical vulnerabilities that potentially exist on our Information Systems such as misconfigurations, CSRFs or cross site request forgeries, privilege escalation attacks, SQL Injection, XSS, and directory traversal attacks.
This Policy excludes the following vulnerabilities, subject to CodeRabbit’s discretion:
general security, email best practices, or missing best practices in SSL/TLS configurations without a working proof-of-concept,
physical compromise or intrusions,
rate limiting or brute-force issues on non-authenticated endpoints,
compromises involving an insider,
social engineering (including phishing attempts),
reflected file downloads,
account takeovers (including any brute force attacks on accounts that are not yours),
red-teaming, adversarial testing of our services,
content issues with CodeRabbit bot and responses,
denial of service attacks,
clickjacking on pages with no sensitive actions,
missing HttpOnly or Secure flags on cookies,
dependency hijacking, or
any widely publicized zero-day vulnerabilities that have no patch or have only had a patch available for less than 30 days
Reporting a Vulnerability
If you believe you've found a security vulnerability, please:
Email us at [email protected] with a detailed description of the vulnerability
Include steps to reproduce the issue
Provide any proof-of-concept code or screenshots if applicable
Avoid accessing or modifying user data
Do not publicly disclose the issue until we've had a chance to address it
What to Include in Your Report
Description of the potential impact
Attack scenario (if applicable)
The type of vulnerability
Technical details and reproducible steps
Affected URLs, parameters, or endpoints
Our Commitment
All good-faith reports will be taken seriously. Upon promptly and responsibly reporting any potential vulnerability you have discovered, you can expect us to promptly evaluate your findings. If we determine (at our sole discretion) that a vulnerability exists, you can expect us to validate the existence of the vulnerability, to confirm the same with you, and to promptly take appropriate steps to address, mitigate, or remediate the vulnerability to the extent feasible.
If you provide your contact information, our representatives may contact you for further information. Additionally, we will:
Protect your name and contact information and will not disclose such information without your consent, unless required by lawful legal process, law or court order;
Refrain from taking legal action as further set forth in the Safe Harbor section below;
With your permission, attribute your name and contribution on any public disclosure we make, to the extent we choose to make a public disclosure;
Acknowledge your submission within three (3) business days; and
Make best efforts to keep you updated and promptly complete our investigation and, if applicable, confirm our remediation strategy within an established timeline.
Vulnerability Scoring
Our vulnerability scoring system helps determine the severity and corresponding reward for reported vulnerabilities. While inspired by CVSS 3.0, our scoring system is customized to better align with our business context, specific security priorities and infrastructure.
Our scoring scale ranges from 0.0 to 10.0, with severity levels mapped as follows:
Critical: 9.0 - 10.0
High: 7.0 - 8.9
Medium: 4.0 - 6.9
Low: 0.1 - 3.9
Score Calculation
The final score is calculated by evaluating:
Base Score: Fundamental characteristics of the vulnerability
Temporal Score: Current state of exploit techniques and available fixes
Environmental Score: Specific impact on CodeRabbit's infrastructure
While our scoring system shares common principles with CVSS 3.0, we've adapted it to better reflect:
Our specific technology stack and architecture
Potential impact on our users and their data
Business-critical functions and services
Real-world exploitability in our context
Rewards
We offer monetary rewards for responsibly disclosed vulnerabilities based on severity:
Critical Severity: $5,000 - $10,000
High Severity: $2,000 - $4,000
Medium Severity: $500 - $1,500
Low Severity: $100 - $400
Safe Harbor
When conducting vulnerability research according to this policy, we consider this research to be:
Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state or national laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy;
Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls;
Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
Lawful, helpful to the overall security of the Internet, and conducted in good faith.
You are expected, as always, to comply with all applicable laws.
To qualify for safe harbor, you must:
Make a good faith effort to avoid privacy violations, and avoid causing any harm to the Information Systems, including avoiding any data destruction, use, access, or acquisition; disruption of Information - - Systems or any customer user experience (including initiating denial of service attacks or using tools that generate substantial amounts of traffic); violation or compromise of the privacy or security of our customers, employees, or other users; or other illegal or harmful activities.
Avoid exploiting any vulnerability beyond what is minimally required to reasonably prove that such potential vulnerability exists, including avoiding accessing, acquiring, or using data that may be accessible from exploiting the vulnerability.
Follow this policy and any other relevant agreements. In case of inconsistency, this policy takes precedence.
Only interact with accounts you own or with explicit permission of the account holder
Not exploit a security issue you discover for any reason other than testing
Report any vulnerability you've discovered promptly
Not, as a condition of disclosure, require payment or compensation, or otherwise make threats to disclose the vulnerability in an irresponsible manner.
Avoid disclosing the existence of or any details relating to the discovered vulnerability to any third party or to the public until you have received prior written approval from us.
Not access, modify, or use data belonging to others, including confidential CodeRabbit data. If a vulnerability exposes such data, stop testing, submit a report immediately, and delete all copies of the information.
Avoid accessing, acquiring, or using the content of any communications, data, or information transmitted or stored on the Information Systems, unless such access is inadvertent.
Not exfiltrate, download, or otherwise retain any data that you collect. If you inadvertently access any data, you will report such access to us as part of your report.
Disclosure of vulnerabilities to CodeRabbit must be unconditional. Do not engage in extortion, threats, or other tactics to elicit a response under duress. CodeRabbit denies Safe Harbor for vulnerability disclosure conducted under such circumstances.
Not be listed on the Specially Designated Nationals and Blocked Persons List as published by the U.S. Treasury Department of Office Foreign Assets Control (“OFAC”) or any other sanctions list, or reside in any country that has been sanctioned by the United States Government.
The safe harbor applies to:
Security research conducted on systems and assets within our scope
Any issues discovered accidentally during your security research
Vulnerabilities discovered by automated tools (if verified manually)
Safe harbor does not apply to:
Tests against systems outside our scope
Social engineering attacks against our employees
Physical attempts to access our offices or data centers
Research conducted in a manner that could impact other users or systems
We reserve the right to modify the safe harbor terms. However, all activities conducted under previous terms will remain protected.
Contact
For any questions about this program, please contact us at [email protected]
Note: This vulnerability disclosure program is subject to change. We reserve the right to modify these terms at any time.