Cerebrum Logo
Cerebrum Logo

Cerebrum Security Disclosure & Bug Bounty

At Cerebrum, we value the security of our systems as much as the privacy of our clients. Our robust compliance solutions are designed to ensure optimal security, and we are dedicated to continuously improving our safeguards.

Bug Bounty Program

We believe that securing our platforms is an ongoing effort, and we acknowledge the valuable role that security researchers play in this process. To show our appreciation, we are launching our Bug Bounty Program. We invite researchers to identify and report potential vulnerabilities in our system.

This program is specifically designed to encourage you to notify us of any previously unreported vulnerabilities. Please note, the bounty will only be paid if the vulnerability reported is unknown to us and was not yet reported.

Security Vulnerability Categories & Bounty Amounts

  • Low-Level Vulnerabilities: These issues may cause minor inconvenience, but they aren’t likely to pose a serious risk.
  • Examples: Lack of proper rate limiting, overly verbose error messages, session management issues, missing security headers.
  • Bounty: $200
  • Medium-Level Vulnerabilities: These vulnerabilities could potentially affect the functionality of our systems or compromise the privacy of a small subset of data.
  • Examples: Weak authorization checks leading to privilege escalation through IDOR, lax CSRF token validation, poor API input validation, missing or expired TLS certificates, insecure file uploads.
  • Bounty: $500
  • High-Level Vulnerabilities: These vulnerabilities could jeopardize the security of our platform or compromise sensitive data on a large scale.
  • Examples: SQL injection attacks, leaks of sensitive PII, subversion of existing encryption measures, arbitrary code execution on the server, access to hashed API keys or passwords.
  • Bounty: $1,500
  • Critical-Level Vulnerabilities: These vulnerabilities could cause a complete system compromise or a catastrophic data breach.
  • Examples: Complete authentication bypass, cloud environment access or takeover, direct access to the database.
  • Bounty: $3,000

Reporting Procedure

We ask you to not disclose the vulnerability publicly before it has been resolved. To report a vulnerability:

  • Document the nature of the vulnerability, steps to reproduce it, and potential impacts. Please include your preferred contact information and PGP key so we are able to communicate back.
  • Ensure that no sensitive data is included in your report unless absolutely necessary.
  • Encrypt the report to our PGP key (see below).
  • Email your report to security@cerebrum.com.
  • Please use the subject format "[VULNERABILITY_TIER] SEVERITY: Security Vulnerability Report for Cerebrum". For example: "HIGH SEVERITY: Security Vulnerability Report for Cerebrum".
  • Ensure that you do not include any sensitive data in the subject line.

Encryption & Sensitive Data Handling

If possible, please use our PGP key to encrypt your communications. In cases where you must include sensitive data in your report, do not send this data in an unencrypted format!

Our public PGP key is printed on this page, and is also available for download via Google Drive. If you download the PGP key from Google Drive, ensure that the last modified date is before July 22nd, 2023.

-----BEGIN PGP PUBLIC KEY BLOCK-----
mQINBGS5qZoBEADEQjX+s5aC77c9ybCenveGN5RFJ+Wk7sURQAwwnAqGoOxiUxta
w0rRl2miCSfNeBJCNClW4YLlhUd44OCb3P3iY6OGZc4xYyibA3CbgK7p/nUzlgSL
TtUjp1VbcST6F0PxYhIDgjpNFJWz3CTegz/dwqVKJ5YvhlLDkYXN2wxa663Y3/p0
bu87rMBWLfnzNhzOFkvycbtSi19hToxbVfAjR39eOQU8PcniJZZ6nsjuV1itl+n5
NpKnyFQMp7B27jk0pIh33NQ7YYABNKrBO+C55B1TBGVdnWBrod4KHrt5M9knPMDs
SlMjZasOOvrpNOnDvl3/jfeBHVdBdSXvs+pmN4qdHeewbJqVobpVi6kTLx/Rysch
2gXOP6FK/KTrfLCfmHg5L4alnT5dPNo2bqngwonezrnu1Rx/EK9sxmNe1JxhblhA
QlsSz/t4DGJTsQeFa1rpSKslQjF4szut5TY9pUho8HWdpM/d7LemLac04tc9Qkdw
ZbhNhGir8jBkVwcRIT3bWTH7jK1uA11dP0balk1nnbPfdQ1eC9kalPBTFVOlGh1m
wLkj4bLuny5NYsREJ+Lxal15edWSy1Uu59tAk2Y4B473FEh4p//pP4aRg+dUWILy
F67+Oat4rzilcBPadYPuZMgDvxUQ19hMz7rSs5cxswcvpL9I8yA8wHcSdQARAQAB
tCRDZXJlYnJ1bSBMTEMgPHNlY3VyaXR5QGNlcmVicnVtLmNvbT6JAlEEEwEIADsW
IQQHyZHZlUE8TUibOybRcTJyCxksYQUCZLmpmgIbAwULCQgHAgIiAgYVCgkICwIE
FgIDAQIeBwIXgAAKCRDRcTJyCxksYUHVD/0XcVT368w3P1bzQb8CqFzyilGHA3qB
MrvLWqmGTSq3bkdsJtD4730etnbHoqe0e1BWJZyCu0p9vCIsXbuIx9fQRRYu8C2i
9KfcLbsjUz19wWsH1KwvIBpTUhwL6xLdSk6Nui7gFXvAisS9e0TI847HeII/mbDe
qn6TVSN1dMCWnLFYA5LLNcjHEqOtuRCOrzhoIn2nUttRfErnBkTC+WNiLT0xd5SQ
GL0E5k99BjmPC5mEpO3vlP8wGB2QTHNtcvOQmcVR56H0ygTxjvFZGR0UP1Yd72ga
niFnpVRe7Yr63fs3u2n3F4ycdRjGXhoG4iLMQ+vZWBFp4xwUMrcnnhI0QbGsZQUU
zrPEjYohSL854ny9r1+zFaW673/uzMo6jgXSDIhhfvkA1zO0ZY725ZCDAHl//rQd
FAT4OD2pwz+0b5WCqO/STPWA6IVPIKYB+Cqo+He308NN8iuHqcEgA5S4pLYXVtlW
K3BvrbiT6vVxnTIXprr+vBmvO7kSXW/03caHlUfLJWINUcCyGMKM5YgSDRKPwjGo
ZPDk5MB3je5LITJouZ9ifZeX4X6uBxHoxJC7q8IAEl/jmFk8yUQD5O2lMgHPdRVy
gsRUMFVXkMLKk7YAeH3SlNrQaPCXyqx/5XqGE0oLpFr0VJeW1OLTqfKYx7Aglm1C
wo7Iiga5M1VnkLkCDQRkuamaARAAs1C54zW8cRyFTrllLBva8pT1ys2TjkWYGb0W
db7nt3xTLnUtrCh7mnUkyvrzLCGbHZdWqBFTVfZ+FMTn/5qZC10kGB5tg96dBzSE
6ZBxhChf5n4BPNgdaA6kTPZ5g1/T9axwMJV07v1ZgwiHDth6Pr3axdWM6RYgRrQf
sg48EG72dr1kiDtsQdSOgjITiFVJY+IyHaVXUrfjNHkaQpz7ODAwlFLkawyqZCz3
xU4RtggWL+mbF1N5DFMJvoZjSpMhUYboVv4xQQp+uu53QJrMwiKNjqInU/AuDCbG
62nXpaGAqy2VBszvUJVxk1Et9Y9XuLzsBsZ7edUNHVXZjE1lJbBxH6DvbH5BxSdF
8wuLvNKjzoaWUmbncQnWIvv9vMA8myKvZaJgLUyvVA7EkqGdvkRuO7ZYaAYj13pg
wVS0sI2ijFlwJf+N2jPtj/Frb+2zmJfIucGE1MKSc1KHmGkSewBlOrWEjFwP5EdF
RnICWZlmo6h8LFgleHMyE9zunG17sHfnQXj50AQMDSEUoGq1VggqyRVZqvtsou7P
84ZqofhGQjT1y27OvATxH6Xci2baTdotYWGQdXdRVsOeb5blLJjxRIq6Oc1+4CkZ
HnddwtVrDXq3TcuEq1siTVHZJv6n6s8d8qVPnbgXOAvzFOa47gVgrJ9ZPcxcGwqH
NlrGOIcAEQEAAYkCNgQYAQgAIBYhBAfJkdmVQTxNSJs7JtFxMnILGSxhBQJkuama
AhsMAAoJENFxMnILGSxhX6YQAK53Xv43BFdLUaCnKzk1eQdWzhd4eZLOvsPtK5vX
axlP6S5tqUDCq4zGVExoen4FDgM+aQ+vl6x35WiQYTlwOHVq0pcjqELXBIF34J/r
MhQpTWEyYLM3lDyxxD1QsdYReZ3empv8G/AXTaGcVC19haNYgIbuY6fea3Z0SK32
tJmwq10h/+4+BnctF4TOJ0SLRxB0AkDaZDkLY/i2QdJK3MDKovmfitmi8eVecTn4
GEnUEDDbthV/mpoCgqyi+52nziNaFn6i//x1cDcZr1M3h0ISqMsSIZzSWzlGZTU/
++BVJULFzpN9/TTWAvEZTjXbPjSdPLVZbueGXb4xv0OZDgHuIEQMegIaadlWU9Tc
Y3tSYZZ6VXqYx1HSGqw9RUmHFc/8xjT2Zprf4TVnlACXf4VWDU9Tmm4aZ3damZsn
vDEPly4MOjox7lWdWiW1ADABt9ZH7hmBWsvfkoeS9y4SreihXweuX5Htd2508RDt
dj9S4GgGUt82LhygQI4HrqJIWH8P/U6io4d8foQUIxHdJtkvxuYtJaavrlKgBN+A
Dx+Nd1nQN7z5fnjgI5BPJJCsismx5nl6/pS6KIX4uMJGdWA/s76aHduZ6HS7EwfW
/Q0lYbB1DdcEPjEvgK8Lq1UbRYz2sfr0SuxJDQISBQp1ITkz0/CDSecFFKW03RbF
cbJj
=hdhG
-----END PGP PUBLIC KEY BLOCK-----

Thank You!

Like the billions of neurons working together in our brain, your contributions help us enhance the robustness of Cerebrum’s security. We appreciate your collaboration and look forward to working together to improve our cybersecurity defenses! Thank you for your help and being a good samaritan!