Vulnerability Disclosure Policy

1. Promise

We take the security of our systems seriously, and we value the security community. The disclosure of security vulnerabilities helps us ensure the security and privacy of our users. We want to hear from you if you have information about a vulnerability in Collective[i]’s application!

2. Scope

https://intelligence.collectivei.com

Any services hosted by 3rd party providers are out of scope.

3. Process

You can send your report to: vdp@collectivei.com.

Please include the following information in your report:

  • How you found the bug and the impact

  • Detailed descriptions of the steps required to reproduce the vulnerability (POC scripts, screenshots, and compressed screen captures, etc.)

  • Any plans for public disclosure

What you can expect from us:

  • A timely response to your email

  • A reasonable timeline for patches and fixes if necessary (usually within 120 days)

  • Credit after the vulnerability has been validated and fixed

  • Collective[i]’s Security Team will monitor all disclosures

The following test types are not authorized:

  • Network denial of service (DoS or DDoS) tests

  • Physical testing (e.g. office access, open doors, tailgating), social engineering (e.g. phishing, vishing), or any other non-technical vulnerability testing

Confidentiality

In order to protect our clients, we request that you keep any information about any vulnerabilities you’ve discovered confidential between yourself and Collective[i] and refrain from publicly posting or sharing any such information until we have had the opportunity to research, respond to and address the reported vulnerability and have informed our clients if necessary.

If applicable, Collective[i] will coordinate public notification of a validated vulnerability with you. When possible, we would prefer that our respective public disclosures be posted simultaneously.