
The Coca-Cola Company Vulnerability Disclosure Program
Welcome
Our purpose is to refresh the world and make a difference, and we can’t do that without trust. Central to maintaining this trust is the protection of the information that we’ve been entrusted with by consumers, our customers and partners, and investors. The Coca-Cola Company recognizes the positive contributions of security researchers and welcomes you to participate in our vulnerability disclosure program.
Ground Rules for Researchers
- While use of automated scanning tools is not prohibited, our security operations team routinely blocks broad and persistent scanning activity. You should limit the scope and frequency of any scanning to prevent this, we'd suggest no more than 5 requests per second.
- Where possible, please include UA-Bugcrowd in your request header as the User-Agent value.
- If you create an identity/account for the purposes of testing an in-scope target, please use your @bugcrowdninja.com email address.
- While testing DoS attacks remains out of scope based on Bugcrowd's standard program terms, we further ask that you be mindful when testing DoS-related functions such as rate limiting of user actions. If you choose to do this, please keep your requests in the dozens, not in the hundreds or thousands, while also continuing to comply with the with the requests per second rules above.
- Please avoid techniques/PoCs that are likely to cause alarms in security monitoring such as opening shells on remote servers. Please coordinate with us in advance on these.
Scope
Program rules
This program follows Bugcrowd’s standard disclosure terms.
For any testing issues (such as broken credentials, inaccessible application, or Bugcrowd Ninja email problems), please email support@bugcrowd.com. We will address your issue as soon as possible.