If you discover a security vulnerability in this project, please report it responsibly.
Email: security@appsecsanta.com
Expected response time: We will acknowledge your report within 48 hours and provide an initial assessment within 5 business days.
- Description of the vulnerability and its potential impact
- Steps to reproduce (the more detail, the better)
- Affected tool(s) and endpoint(s)
- Your suggested fix, if you have one
We consider these security vulnerabilities:
- Server-Side Request Forgery (SSRF) -- Ability to make the tool scan internal/private IP ranges or cloud metadata endpoints
- Injection attacks -- Code injection, header injection, or DNS rebinding through scan inputs
- Authentication/authorization bypass -- Circumventing rate limits, API keys, or origin restrictions
- Information disclosure -- Leaking server internals, environment variables, or other users' scan results
- Denial of service -- Input that crashes the worker or causes excessive resource consumption
These are regular bugs, not security vulnerabilities. Please file a GitHub issue instead:
- Incorrect scan results or scoring errors
- UI rendering issues
- Broken links or typos in documentation
- Feature requests
- Tools correctly reporting that a target has poor security
We support responsible security research. If you act in good faith and follow this policy, we commit to:
- Not pursuing legal action against you for your research
- Not reporting your activity to law enforcement for research conducted under this policy
- Working with you to understand and resolve the issue quickly
- Crediting you in the fix (unless you prefer to remain anonymous)
To qualify for safe harbor:
- Report the vulnerability promptly after discovery
- Avoid accessing, modifying, or deleting data that doesn't belong to you
- Don't degrade the service for other users
- Don't scan third-party targets using a vulnerability in our tools
- Give us reasonable time to fix the issue before any public disclosure
This policy covers all code in this repository, including:
- Cloudflare Pages Functions (API endpoints)
- Scoring logic and test implementations
- Rate limiting and input validation
Infrastructure that is out of scope (report to the respective provider instead):
- Cloudflare's platform itself
- Third-party DNS resolvers or certificate transparency logs
- The targets being scanned by the tools
- You report the vulnerability.
- We acknowledge within 48 hours.
- We assess severity and develop a fix (target: 14 days for critical, 30 days for others).
- We deploy the fix and notify you.
- We coordinate public disclosure timing with you.