Frontegg looks forward to working with the security community to find vulnerabilities in order to keep our businesses and customers safe.
Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Unlike traditional user management platforms, integrating Frontegg into your app takes minutes, unlocking a whole new level of end-user experience.
Frontegg’s platform doesn’t just provide you with Authentication & SSO via an embeddable or hosted login-box, but a full Admin Portal serving as the Settings area for your users. The Admin Portal allows your users to control every aspect of their accounts: manage users & teams, define and assign roles & permissions, get visibility through audit logs, subscribe to webhooks and much more. Frontegg’s interfaces are embedded as a UI layer within your app and becomes a customer-facing management interface for your end-users, both on the personal and workspace levels. Frontegg also powers-up your backend through rich SDKs supported in various languages and frameworks. # Response Targets Frontegg will make a best effort to meet the following SLAs for hackers participating in our program:
We’ll try to keep you informed about our progress throughout the process.
Focus areas We are most interested in critical vulnerabilities related to authentication and access:
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
Only these domains are in the scope of the program: portal.au.frontegg.com api.au.frontegg.com
Any domain/property of Frontegg not listed in this list is out of scope.
For the initial prioritization/rating of findings, this program will use CVSS. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher – along with the opportunity to appeal, and make a case for a higher priority.
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Frontegg and our users safe!
Contact the Frontegg team to disclose any suspicious activity