Vulnerability Disclosure Program
Introduction
At Bloom Credit Inc. (“Bloom” or “Bloom Credit”), protecting the confidentiality, integrity and availability of customer data is core to our mission. We believe that earning the trust of our consumers, customers, and partners begins with protecting the information that we’ve been entrusted with. As part of our security efforts, we value collaboration with the research community and welcome responsible, professional and discretionary disclosure of vulnerabilities through the Bloom Credit Vulnerability Disclosure Program (“VDP” or the “Program”).
Out Of Scope Systems | In Scope Systems
What You Can Expect from Bloom
When acting in accordance with the Bloom VDP, you can expect us to:
Please note, the expectations listed above may not apply to products and services that Bloom has released within the last six (6) months.
What Bloom Expects from VDP Participants
The VDP is open to all with the exception of current Bloom employees and contractors. While acting in accordance with the Bloom VDP objectives, we expect you to:
VDP Rules
As part of your participation in this program, you agree to adhere to all of the following rules:
We understand that the very act of identifying a vulnerability may contradict some of these rules, but we trust and expect that you will operate in good faith and limit these contraventions to the minimum extent necessary.
Reporting
If you believe you’ve found a security issue in one of our products or services, please email us at [email protected] and include the following details within your report:
Disclaimer: In regard to the above, please note the following:
If you feel the need, you may use our PGP public key to encrypt your communications with us.
In Scope Systems and Services
Any Bloom developed web service that handles sensitive user data is intended to be in scope. This includes:
Out of Scope Systems and Services
Commercial Off-the-Shelf software used to support Bloom’s business, but which does not handle sensitive user data is out of scope. This includes, but is not limited to:
Non-qualifying Vulnerabilities
Bloom welcomes and places high value on reports of vulnerabilities that substantially affect the confidentiality, integrity and availability of Bloom Systems and Services. Some reported findings may have little value or no practical significance to our product security posture. Bloom reserves the right to make this determination, and we will do it in good faith. A finding that would be considered low-value, and therefore would not qualify for a reward include, but is not limited to:
- Comma Separated Values (CSV) injection without demonstrating a vulnerability.
- Content spoofing and/or text injection issues without showing an attack vector.
- Clickjacking on pages with no sensitive actions.
- Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions.
- Denial of Service (DoS).
- Issues that require unlikely user interaction by the victim.
- Missing best practices in Content Security Policy.
- Missing best practices in SSL/TLS configuration.
- Missing email best practices (Invalid, incomplete or missing SPF/DKIM/DMARC records, etc.).
- Rate limiting or brute-force issues on non-authentication endpoints.
- Software version disclosure / Banner identification issues.
- Output from Automated Scanners without a PoC to demonstrate a specific vulnerability.
- Previously known vulnerable libraries without a working Proof of Concept.
- Vulnerabilities only affecting users of outdated or unpatched browsers.
Reward
Bloom may offer monetary recognition for vulnerability reports that have a significant business impact on our customers, products, or services. Rewards for qualifying findings are provided at Bloom’s discretion based on the criticality of the vulnerability, up to $10,000 in appreciation of your help protecting business critical ones and zeros.
Eligibility for monetary recognition is determined by calculating the internal severity of a finding against the potential impact to Bloom and its customers. We reserve the right, in our sole discretion, to determine vulnerability qualification for a monetary reward.
Assuming that the issue in question is determined to be valid and significant, the following rules apply:
Thank you for helping us keep Bloom and our customer’s data safe.
Legal
Non-Disclosure Agreement: All information relating to vulnerabilities that you become aware of through the Bloom’s VDP is considered confidential. In order to give Bloom time to remediate a vulnerability, you agree to refrain from disclosing confidential information publicly or to any third party (outside of Bloom) without prior, written approval from the Information Security team at Bloom: [email protected]. You agree to honor any request from the Information Security team at Bloom Credit to promptly return or destroy all copies of confidential information and all notes related to the confidential information.
In honor of our commitment to collaboration and transparency, the Bloom Information Security team will not withhold approval of disclosure unless Bloom believes, in good faith, that confidentiality is required to avoid material harm.
You must comply with all applicable laws, rules and regulations (including those local to you) with respect to your activities related to the Bloom Credit VDP. Rewards will not be issued to you if you are (a) in an US embargoed country or (b) on an US Government list of sanctioned or restricted or affiliated with any sanctioned or restricted individuals or entities.
Bloom reserves the right to cancel or modify the terms and conditions of this VDP at any time, and your participation in the Program constitutes acceptance of all terms. Please check this site regularly as we routinely update our VDP terms and eligibility, which are effective upon posting.
Safe Harbor
Any activities conducted in a manner consistent with this VDP will be considered authorized conduct and we will not initiate legal action against you.