Indeed's vulnerability disclosure policy

Vulnerability disclosure philosophy

Indeed believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency and common good between Indeed and Security Researchers. Together, our vigilant expertise promotes the continued security and privacy of Indeed customers, products, and services.

Security researchers

Indeed accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers and consultants. Indeed defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability or confidentiality of our products and services.

Scope

This policy applies to any digital assets owned, operated, or maintained by Indeed, including public facing websites.

Our commitment to researchers

  1. Trust

    We maintain trust and confidentiality in our professional exchanges with security researchers.

  2. Respect

    We treat all researchers with respect and recognize your contribution for keeping our customers safe and secure.

  3. Transparency

    We will work with you to validate and remediate reported vulnerabilities in accordance with our commitment to security and privacy.

  4. Common Good

    We investigate and remediate issues in a manner consistent with protecting the safety and security of those potentially affected by a reported vulnerability.

Previous Slide
Next Slide

What we ask of researchers

  1. Trust

    We request that you communicate about potential vulnerabilities in a responsible manner, providing sufficient time and information for our team to validate and address potential issues.

  2. Respect

    We request that researchers make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction of data during security testing.

  3. Transparency

    We request that researchers provide the technical details and background necessary for our team to identify and validate reported issues, using the form below.

  4. Common Good

    We request that researchers act for the common good, protecting user privacy and security by refraining from publicly disclosing unverified vulnerabilities until our team has had time to validate and address reported issues.

Previous Slide
Next Slide

Vulnerability Reporting

Indeed recommends that security researchers share the details of any suspected vulnerabilities across any asset owned, controlled, or operated by Indeed (or that would reasonably impact the security of Indeed and our users) using the web form below. The Indeed Security team will acknowledge receipt of each vulnerability report, conduct a thorough investigation, and then take appropriate action for resolution.

VDP vs Bug Bounty

Security researchers who are interested in monetary rewards for reporting vulnerabilities should join Indeed’s Bug Bounty Program and submit through that program.

The following web form is submitted to our Vulnerability Disclosure Program (VDP) which is available for security researchers, industry partners, vendors, customers and consultants who would like to make a ‘good neighbor’ vulnerability disclosure. By reporting vulnerabilities through the following web form, you understand that this program is not rewardable.

By reporting vulnerabilities through the following VDP web form, you understand that this program is not rewardable, you agree to Indeed’s Terms of Service, and acknowledge Indeed’s Privacy Policy and Vulnerability Disclosure Policy.