Our platform of secure edge services is developed in pursuit of our ultimate mission: to make the internet safe. We greatly value the hard work and genius of the internet security research community, and welcome reports of any discovered StackPath platform vulnerability.
If you identify a vulnerability in our platform please notify us right away through the methods outlined in our Vulnerability Disclosure Program. We investigate all reported vulnerabilities and resolve identified issues as quickly as possible. We appreciate your efforts and cooperation avoiding privacy violations, damaging data, or otherwise interrupting or causing a negative impact on any of our services as you conduct your research.
For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.
Out of scope
Testing is only authorized on the targets listed as In-Scope. Any domain/property of StackPath not listed in the targets section is out of scope. This includes any/all subdomains not listed above. If you believe you've identified a vulnerability on a system outside the scope, please reach out to email@example.com before submitting.
*.highwinds.comis used for all public services, including the main website, customer portal, API, ssh, mail, etc.
*.stackpath.netis generally used for internal company resources/services
All of the above targets are publicly accessible, researchers are encouraged to create trial accounts to test with, or utilize any existing accounts already legally owned. Please DO NOT perform any testing against accounts you do not expressly own.
Out of Scope:
- Customer owned CDN sites not personally owned by the researcher are not in scope (e.g.
- Researchers are encouraged to check our status page for any ongoing issues that may interfere with testing. https://status.stackpath.com