Docs
Bug Bounty Program

bug

At Lamatic, we believe in collaborating with the global security researcher community to enhance the security of our products. By welcoming researchers to identify vulnerabilities in our systems, we aim to make our products more secure while fostering a cooperative security ecosystem. To this end, we reward researchers for their valuable contributions.

Scope of the Program

In Scope

The following areas and vulnerabilities are included in the Bug Bounty Program:

  1. Products

    • Web applications
    • APIs
    • Cloud services
  2. Vulnerability Categories

    • Cross-Site Scripting (XSS)
    • SQL Injection
    • Authentication flaws
    • Data leakage
    • Privilege escalation

Out of Scope

The following are not covered by the program:

  1. Social engineering attacks
  2. Physical security vulnerabilities
  3. Denial of Service (DoS) attacks
  4. Third-party integrations not owned or controlled by Lamatic

Submission Guidelines

Security researchers are required to provide detailed information about identified vulnerabilities. Submissions should include:

  1. A clear description of the vulnerability
  2. Step-by-step instructions to reproduce the issue
  3. An impact analysis outlining the potential risk
  4. Supporting evidence such as screenshots, videos, or scripts
  5. Recommendations for remediation

Submission Process

  • Email your findings to [email protected]
  • Use the subject line: [Bug Bounty] <Bug Title>

Response Times

We strive to provide timely responses to all submissions:

  1. Initial response: 24 hours
  2. Severity assessment: 48 hours
  3. Status updates: Every 5 business days
  4. Payment processing: Within 15 days of validation

Review Process

StepDescription
1. AcknowledgmentConfirm receipt of the report within 24-48 hours. Assign a unique Reference ID to track the submission.
2. Initial Assessment- Validate the authenticity of the issue.
- Perform a Duplicate Check to ensure the bug hasn’t been previously reported.
- Share an NDA if necessary.
3. Severity AnalysisAssess the severity using a standard rating system such as CVSS:
- Critical: Immediate, widespread impact (e.g., RCE, data breaches).
- High: Significant functionality or security risks.
- Medium: Moderate impact.
- Low: Minor risks.
4. Assignment & PrioritizationAssign the validated issue to the appropriate team and prioritize based on severity.
5. Development & FixingAddress the issue based on priority and ensure timely resolution.
6. Researcher VerificationNotify the researcher upon resolving the issue. Provide testing environments or evidence (e.g., logs, screenshots) for verification.
7. Reward & ClosureIssue the reward based on the severity, impact, and uniqueness of the vulnerability.
8. Post-Resolution AnalysisConduct a root cause analysis to identify gaps in code review, testing, or system architecture.

Rules of Engagement

To ensure ethical conduct, researchers are required to adhere to the following guidelines:

Do’sDon’ts
Test only within the defined scope.Do not exploit vulnerabilities beyond proof-of-concept.
Avoid impacting production systems.Refrain from using automated tools that degrade performance.
Report vulnerabilities immediately upon discovery.Do not access or modify data without explicit consent.

Legal Protections

Safe Harbor Clause

Lamatic provides safe harbor for researchers acting in good faith, ensuring protection from legal consequences as long as they:

  1. Operate within the defined scope and guidelines
  2. Avoid compromising user data
  3. Do not disrupt services
  4. Responsibly report vulnerabilities through the program

Rewards

Severity LevelExample VulnerabilitiesReward Range
CriticalRemote code execution, data breaches$500–$1000+
HighPrivilege escalation, bypassing authentication$300–$500
MediumSensitive data exposure, API misuse$100–$200
LowMinor misconfigurations, non-sensitive info leaksGoodies and swag

Note: Rewards are determined based on the severity, reproducibility, and uniqueness of the submission.


Thank you for contributing to the security of Lamatic's products!

Was this page useful?

Questions? We're here to help

Subscribe to updates