Responsible Disclosure Policy

An e-commerce team works together to improve the site experience for its users.

Last updated: Dec 12, 2024

Crossing Minds is committed to ensuring the safety and security of our customers and employees. We aim to foster an environment of trust, and an open partnership with the security community, and we recognize the importance of vulnerability disclosures in continuing to ensure safety and security for all of our customers, employees and company. We have developed this policy to both reflect our corporate values and to uphold our legal responsibility to good-faith security researchers that are providing us with their expertise.

How to Submit a Vulnerability

To submit a vulnerability report to the Crossing Minds Security Team, please utilize the following email: security@crossingminds.com.


Exclusions

Crossing Minds is publishing this policy to help ensure a safe and secure environment for all of its users. With that in mind, we ask that during your research you refrain from:

  • Denial-of-Service (DoS)
  • Spamming
  • Social engineering or phishing of Crossing Minds employees or contractors
  • Any attacks against Crossing Minds' physical property or data centers

This policy applies to the Crossing Minds API and to any other subdomains or services associated with Crossing Minds. We do not accept reports for vulnerabilities solely affecting our marketing website (www.crossingminds.com) which contains no sensitive data.

Thank you for helping to keep Crossing Minds and our users safe!

What we would like to see from you:

  • Well-written reports in English will have a higher probability of resolution.
  • Reports that include proof-of-concept code equip us to better triage.
  • Reports that include only crash dumps or other automated tool output may receive lower priority.
  • Reports that include products not on the initial scope list may receive lower priority.
  • Please include how you found the bug, the impact, and any potential remediation.
  • Please include any plans or intentions for public disclosure.


What you can expect from Crossing Minds:

  • A response to valid vulnerability report emails within 24 hours.
  • After triage, we will send an expected timeline, and commit to being as transparent as possible about the remediation timeline as well as on issues or challenges that may extend it.
  • An open dialog to discuss issues.
  • Notification when the vulnerability analysis has completed each stage of our review.
  • Credit after the vulnerability has been validated and fixed.

If we are unable to resolve communication issues or other problems, Crossing Minds may bring in a neutral third party to assist in determining how best to handle the vulnerability.