We welcome and appreciate the responsible disclosure of security vulnerabilities from the security research community. By collaborating with researchers, we continuously enhance the security of our products and services to protect our users and ecosystem partners.

Scope:

Web applications: kiwibit.com

Mobile Applications: Kiwibit (iOS / Android)

Cloud Services and APIs: IoT platform (device management, account and authentication, data and log interfaces)

Devices and Firmware: Network cameras / Smart bird feeders (including network configuration, upgrades, logs, local/remote debugging)

Real-time Audio and Video: IoT-RTC / signaling, streaming/playback, P2P/relay, media storage

Authentication and Identity Mechanisms

Reporting Method:

If you discover a potential security issue, please send an email to support@kiwibit.com, and include as much information as possible:

Affected target (app, firmware version, etc.)

Vulnerability type, scope of impact, and brief description of business impact

Steps to Reproduce the Vulnerability (if available)

Expected and actual results

Relevant logs, screenshots, or network captures (if applicable, ensure sensitive data is masked)

Contact information and optional public key (for encrypted communication)

Response and Fix Timelines:

Critical issues: Initial response and classification within 48 hours

High-severity issues: Initial response and classification within 3 business days

Other issues: Response and action plan within 7 business days

We aim to complete fixes within 90 days, depending on the complexity and dependencies of the issue.

Collaboration Process:

Vulnerability submission Vulnerability review Classification and reproduction Fix and mitigation Summary release

Participation Rules:

Respect and protect user privacy and data.

Avoid causing service interruptions, degradations, or additional costs.

Unauthorized access, modification, or deletion of data is prohibited.

Test only within the scope defined in this document and comply with applicable laws and regulations.

Prohibited Actions:

Exploiting vulnerabilities for profit, harming users, or disrupting system availability.

Downloading or retaining Kiwibit’s source code, production data, or intellectual property content.

Performing tests that result in service disruptions, data loss, or device damage

Intimidating, extorting, or exaggerating impacts to create panic.

Publicly disclosing, spreading, or trading vulnerability details before a fix is implemented.

Performing tests that violate international laws or local regulations.

Failing to properly protect data and credentials during testing

Public Disclosure:

We support responsible disclosure. Please do not publicly disclose technical details or exploit code before vulnerabilities are fixed or mitigated. If coordination of the disclosure time is needed, please contact us via email to agree on the timeline and scope.

Contact Us:

For security issues, please email support@kiwibit.com

Disclaimer:

Kiwibit may update this page without notice. By participating in vulnerability disclosure, you agree to the above rules and guidelines. This document does not constitute a commitment to any rewards or compensation.