We take the security of our systems seriously, and we value the security community. The disclosure of security vulnerabilities helps us ensure the security and privacy of our users. We ask all researchers to follow the guidelines below.
We require that all researchers:
- Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction of data during security testing;
- Perform research only within the scope set out below;
- Use the identified communication channels to report vulnerability information to us; and
- Keep information about any vulnerabilities you’ve discovered confidential between yourself and Veriff until we have resolved the issue.
If you follow these guidelines when reporting an issue to us, we commit to:
- Not pursuing or supporting any legal action related to your research;
- Working with you to understand and resolve the issue quickly.
- iOS application
- Android application
Out of Scope
- Findings from physical testing such as office access (e.g. open doors, tailgating)
- Findings derived primarily from social engineering (e.g. phishing, vishing)
- Findings from applications or systems not listed in the ‘Scope’ section
- UI and UX bugs and spelling mistakes
The following potential issues are not considered in scope:
- Lack of rate limiting on any resources
- Password policy issues, including lack of upper limit on passwords
- HTTP 404 or other error codes and pages
- Banner or version disclosure of any kind
- Presence of common public files, such as robots.txt or files in the .well-known directory
- CSRF on anonymous resources, or any CSRF issue which does not include an exploit showing control over sensitive actions
- Clickjacking issues, unless an exploit showing account takeover or disclosure of sensitive resources is provided
- Self-XSS issues
- SPF/DKIM/DMARC configuration issues
- DoS and overloading server with many requests or large requests
- Accessing and copying our customer data
- Conducting research against our partners and customers
- Abusing our services to conduct fraud
- Use of automated scanning tools
If you have discovered a security vulnerability, please share your findings with us by filling the form below.
- Please include our name/handle and a link for recognition in our Hall of Fame: https://www.veriff.com/hall-of-fame
Note: We do not currently offer bounties or other rewards for submitted vulnerability reports.
- Please note that we register your data in connection with your report and our internal further processes. If you want to know more about how we process your personal data, please read more on: https://www.veriff.com/privacy-policy. If you wish to report the issue anonymously, please state this in your communication, and we will not contact you or retain your personal information.
- Valid from: November 28, 2020
- Last update: June 1, 2022