โ Back to Home
๐ Security & Vulnerability Disclosure
Responsible Disclosure Policy | Last Updated: October 29, 2025
We Value Security Researchers
Found a security vulnerability? Thank you for helping us keep s4โข secure! We appreciate responsible disclosure and will work with you to address issues promptly.
๐ฏ Scope
In Scope (Eligible for Bounty)
- s4โข Security Suite Software (all platforms: Windows, macOS, Linux, iOS, Android)
- License Server:
license.s4.software
- Authentication System:
auth.s4.software
- Download Portal:
download.s4.software
- Main Website:
s4.software
- API Endpoints: All
/api/* routes
- Certificate Pinning: Bypass attempts
- License Activation: Cracking or circumvention
Out of Scope (Not Eligible)
- Social engineering attacks
- Physical attacks on servers
- Denial of Service (DoS/DDoS)
- Spam or brute force attacks
- Issues in third-party dependencies (report to them first)
- Previously known/reported vulnerabilities
- Non-security bugs (use regular support)
๐ง How to Report
โ ๏ธ CRITICAL: DO NOT Publicly Disclose
Please DO NOT disclose vulnerabilities publicly until we've had time to fix them. Public disclosure before patching puts users at risk.
Reporting Methods
What to Include
- Vulnerability Type: SQL injection, XSS, RCE, authentication bypass, etc.
- Affected Component: Specific platform, endpoint, or feature
- Severity Assessment: Critical, High, Medium, or Low
- Proof of Concept: Steps to reproduce, code, or screenshots
- Potential Impact: What can an attacker do?
- Your Contact Info: Email, name/handle for credit
- Suggested Fix (optional): How to remediate
๐ Bug Bounty Program
Severity Levels & Rewards
CRITICAL
Examples: Remote code execution, complete license bypass, server takeover, mass data breach
Reward: $5,000 - $15,000
Response Time: 24 hours
Patch Target: 7 days
HIGH
Examples: Certificate pinning bypass, authentication bypass, privilege escalation, sensitive data exposure
Reward: $1,000 - $5,000
Response Time: 48 hours
Patch Target: 14 days
MEDIUM
Examples: XSS, CSRF, information disclosure, session hijacking
Reward: $250 - $1,000
Response Time: 5 business days
Patch Target: 30 days
LOW
Examples: Security misconfiguration, weak cipher, verbose error messages
Reward: $50 - $250
Response Time: 10 business days
Patch Target: 60 days
Bonus Multipliers
- 2x: Excellent write-up with detailed remediation
- 1.5x: Working proof-of-concept code
- 1.5x: Multiple related vulnerabilities (chain)
- 1.25x: First reporter (if duplicate)
๐ Disclosure Timeline
Our Commitment
- Acknowledgment: We'll confirm receipt within 24-48 hours
- Validation: We'll verify the vulnerability within 3-5 business days
- Bounty Decision: Award amount communicated within 7 days
- Patch Development: Fix created within target timeframe
- Deployment: Patch rolled out to all users
- Public Disclosure: 90 days after patch or mutual agreement
- Payment: Bounty paid within 30 days of fix deployment
Public Disclosure
We support public disclosure after:
- Patch is deployed to all users
- 90-day waiting period has passed
- Mutual agreement on disclosure timing
We'll give you credit in our security acknowledgments page unless you prefer to remain anonymous.
๐๏ธ Hall of Fame
Security researchers who report valid vulnerabilities will be listed on our Hall of Fame page (with permission). Thank you to our contributors:
- Be the first to contribute!
โ๏ธ Safe Harbor
We will not pursue legal action against security researchers who:
- Follow responsible disclosure practices
- Make good faith efforts to avoid data destruction or privacy violations
- Do not exploit vulnerabilities beyond proof-of-concept testing
- Do not access, modify, or exfiltrate user data
- Do not perform denial of service attacks
- Comply with all applicable laws
Prohibited Activities
- Testing on production systems without permission
- Automated scanning that impacts performance
- Social engineering of employees or users
- Physical attacks or attempts
- Extortion or threats
๐ Our Security Measures
We take security seriously and have implemented multiple layers of protection:
- Certificate Pinning: SHA256 cert + public key hash validation
- SNI Routing: Secure traffic routing without decryption
- Zero-Log VPN: No connection logs stored
- End-to-End Encryption: AES-256-GCM encryption
- Anti-Tampering: Code integrity checks and debugger detection
- Hardware Fingerprinting: Non-reversible device identification
- Rate Limiting: Protection against brute force attacks
- Security Headers: CSP, HSTS, X-Frame-Options, etc.
๐ Vulnerability Categories
High Priority
- Remote Code Execution (RCE)
- SQL Injection
- Authentication Bypass
- License Activation Bypass
- Certificate Pinning Bypass
- Privilege Escalation
- Server-Side Request Forgery (SSRF)
Medium Priority
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Information Disclosure
- Session Hijacking
- Insecure Direct Object Reference (IDOR)
Lower Priority (Still Rewarded)
- Security Misconfiguration
- Weak Cryptography
- Missing Security Headers
- Open Redirects
- Verbose Error Messages
๐ Contact Security Team
๐ Additional Resources
Thank you for helping keep s4โข secure!
Responsible security researchers make the internet safer for everyone.
s4โข Corporation ยท Security Team ยท Last Updated: October 29, 2025
โ Back to Home