Legal Information Booking Software Terms and Conditions Distribution Services Terms and Conditions RezdyPay Terms of Service Website Terms of Use Rezdy will be temporarily suspending the bug bounty/rewards program.We will honour reviewing anything already raised to date and will reach out over the next few months, once we’ve had the opportunity to review.Rezdy is committed to the security of our customers and their data. We believe that coordinated disclosure by security researchers and engaging with the security community is a important means of achieving our security goals.If you believe you have found a security vulnerability in one of our products, we welcome and greatly appreciate you reporting it to security@rezdy.com, as long as it falls in scope and is not one of the types of vulnerability listed as out-of-scope below.ScopeDomains IN SCOPE are:app.rezdy.comauth.rezdy.comdemo-booking-form.rezdy.comsvc-auth.rezdy.comservices.rezdy.comsecured.rezdy.comThe following items can be reported to us via email, but are out of scope for bounty rewards:Cross-site scripting (XSS)Cross-site request forgery (CSRF/XSRF)HTML injectionVulnerabilities related to 3rd-party software, libraries & scriptsContent-Security-Policy and X-Frame headers (including clickjacking)Rezdy API keys publicly availableCORS configurationThe following items should not be reported:Stack tracesApplication or server error messagesUse of out-of-date 3rd party libraries without proof of exploitabilityPassword or account recovery policies (e.g. reset link expiration, password complexity , session invalidation, login with both email and oauth)Reports from automated web security scannersHTTP 404 codes/pages or other HTTP non-200 codes/pagesDisclosure of known public files or directories, (e.g. robots.txt)Vulnerabilities only affecting end of life browsers or platformsPresence of application or web browser ‘autocomplete’ or ‘save password’ functionalityContent spoofing/text injectionPresence or absence of HTTP headers (nosniff, HOST, etc.)Server information disclosure (e.g. version, hostname)Disclosure PolicyTo encourage coordinated disclosure, Rezdy does not intend to initiate any legal action or law enforcement investigation against security researchers as long as they adhere to the following guidelines:Researchers will report details of a discovered security issue to Rezdy without making any information or details of the vulnerability publicResearchers will allow Rezdy reasonable time to resolve the issue before publishing any information or details about the vulnerability or other making such information generally known. Rezdy will commit to provide an initial response to the researcher within 30 days.Researchers will make all reasonable attempts in good faith to avoid destroying, stealing, modifying, damaging, violating or otherwise jeopardizing the privacy of any Rezdy customer or data. This includes disrupting or degrading Rezdy’s products and service to its customers.The following are expressly prohibited and are not covered under the above Coordinated Disclosure Policy:Denial of serviceSpammingBrute-force attacksSocial engineering (including phishing) of Rezdy staff or contractorsAny physical attempts against Rezdy propertyBounty rewardsAt this time, we are not automatically awarding bounties or cash rewards for reported vulnerabilities. However, we’re able to reward researchers who find highly critical issues on a case-by-case basis.
By continuing to use this website you agree to the use of cookies according to our privacy policy and terms. Okay