summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniel Stenberg <daniel@haxx.se>2021-02-03 14:24:09 +0100
committerDaniel Stenberg <daniel@haxx.se>2021-02-03 14:24:25 +0100
commita030c59c6d288161614bf1c23b34cf2ab0393802 (patch)
tree80bc9bf864359bc879b1d6c3503beb0309f83803
parent2f33be817cbce6ad7a36f27dd7ada9219f13584c (diff)
downloadcurl-a030c59c6d288161614bf1c23b34cf2ab0393802.tar.gz
BUG-BOUNTY: removed the cooperation mention
-rw-r--r--docs/BUG-BOUNTY.md19
1 files changed, 0 insertions, 19 deletions
diff --git a/docs/BUG-BOUNTY.md b/docs/BUG-BOUNTY.md
index c360f2915..5cbb343b0 100644
--- a/docs/BUG-BOUNTY.md
+++ b/docs/BUG-BOUNTY.md
@@ -81,22 +81,3 @@ In the event that the individual receiving a curl bug bounty needs to pay
taxes on the reward money, the responsibility lies with the receiver. The
curl project or its security team never actually receive any of this money,
hold the money, or pay out the money.
-
-## Bonus levels
-
-In cooperation with [Dropbox](https://www.dropbox.com) the curl bug bounty can
-offer the highest levels of rewards if the issue covers one of the interest
-areas of theirs - and only if the bug is graded *high* or *critical*. A
-non-exhaustive list of vulnerabilities Dropbox is interested in are:
-
- - RCE
- - URL parsing vulnerabilities with demonstrable security impact
-
-Dropbox would generally hand out rewards for critical vulnerabilities ranging
-from 12k-32k USD where RCE is on the upper end of the spectrum.
-
-URL parsing vulnerabilities with demonstrable security impact might include
-incorrectly determining the authority of a URL when a special character is
-inserted into the path of the URL (as a hypothetical). This type of
-vulnerability would likely yield 6k-12k unless further impact could be
-demonstrated.