🛡️ Responsible Disclosure Policy

Last Updated: 2025-12-11

Our Approach

BigHole follows a responsible disclosure model. When we detect exposed credentials, we:

  1. Verify the exposure exists in a public repository
  2. Verify the credential is active (minimal, read-only test)
  3. Privately notify the repository owner
  4. Wait 7 days before any follow-up
  5. Never publicly disclose specific findings

Notification Process

✅ What we send:
❌ What we DON'T send:

Reporting Vulnerabilities in BigHole

If you discover a vulnerability in BigHole itself:

  1. DO NOT open a public issue
  2. Email us or use GitHub's private security reporting
  3. Include:

Safe Harbor

We consider security research conducted consistent with this policy to be:

We will not pursue legal action against researchers acting in good faith.

Scope

In Scope Out of Scope
  • BigHole application
  • Our API endpoints
  • Our notification system
  • Third-party services
  • Social engineering
  • Physical attacks
  • DoS attacks

Recognition

We maintain a Hall of Fame for security researchers who help improve BigHole (with their permission).

Legal Basis

Our scanning activities are based on:

Contact

For disclosure-related inquiries, please use our abuse report form or open a private security advisory on GitHub.

← Back to Home