Products Little Snitch Little Snitch Mini Micro Snitch LaunchBar Internet Access Policy Viewer More Products Shop Support Blog

Vulnerability Disclosure Policy

Security is core to our values, and we value the input of hackers acting in good faith to help us maintain a high standard for the security and privacy for our users. This includes encouraging responsible vulnerability research and disclosure. This policy sets out our definition of good faith in the context of finding and reporting vulnerabilities, as well as what you can expect from us in return.

Expectations

When working with us according to this policy, you can expect us to:

  • Extend Safe Harbor (see below) for your vulnerability research that is related to this policy;
  • Work with you to understand and validate your report, including a timely initial response to the submission (usually within one business day);
  • Work to remediate discovered vulnerabilities in a timely manner; and
  • Recognize your contribution to improving our security if you are the first to report a unique vulnerability, and your report triggers a code or configuration change.

Ground Rules

To encourage vulnerability research and to avoid any confusion between good-faith hacking and malicious attack, we ask that you:

  • Play by the rules. This includes following this policy, as well as any other relevant agreements. If there is any inconsistency between this policy and any other relevant terms, the terms of this policy will prevail;
  • Report any vulnerability you’ve discovered promptly;
  • Avoid violating the privacy of others, disrupting our systems, destroying data, and/or harming user experience;
  • Use only the Official Channel (see below) to discuss vulnerability information with us;
  • Keep the details of any discovered vulnerabilities confidential until we’ve had at least 90 days to resolve the issue or until they are fixed;
  • Perform testing only on systems in the Scope of this policy (see below), and respect systems and activities which are out-of-scope;
  • If a vulnerability provides unintended access to data: Limit the amount of data you access to the minimum required for effectively demonstrating a Proof of Concept; and cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII) or proprietary information;
  • Do not engage in extortion.

Safe Harbor

When conducting vulnerability research according to this policy, we consider this research to be:

  • Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar national or state laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy;
  • Exempt from national implementations of the WIPO Copyright Treaty (such as the Digital Millennium Copyright Act in the US), and we will not bring a claim against you for circumvention of technology controls;
  • Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
  • Lawful, helpful to the overall security of the Internet, and conducted in good faith.

You are expected, as always, to comply with all applicable laws.

If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through our Official Channel (see below) before going any further.

Scope

The scope of this policy covers:

  • Our web site and other Internet resources in the domain obdev.at;
  • All software which can be downloaded from servers in the domain obdev.at

Explicitly not in the scope of this policy are third party services such as our payment processors unzer.com and paypal.com.

CVE Numbers

We, Objective Development, are a CVE Numbering Authority (CNA) for the scope of our own products and services as outlined under "Scope" above. This means that all information about vulnerabilities of these products and services must be directed to our Official Channel (see below).

If we acknowledge the issue you report as a vulnerability, we assign a CVE number. The number and associated data is kept secret until either (a) the issue is fixed and customers have been given time to upgrade, or (b) the issue has become public.

Official Channel

If you believe you’ve found a security vulnerability in one of our products or platforms please send it to us by emailing security@obdev.at. Please include the following details with your report:

  • Description of the location and potential impact of the vulnerability;
  • A detailed description of the steps required to reproduce the vulnerability (POC scripts, screenshots, and compressed screen captures are all helpful to us); and
  • Your name/handle and a link for recognition in release notes.

If you’d like to encrypt the information, please use our PGP key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=kkQ1
-----END PGP PUBLIC KEY BLOCK-----

Acknowledgements

This Vulnerability Disclosure Policy is based in part on documents provided by disclose.io and Bugcrowd.

Little Snitch

Features What’s New Download Release Notes Upgrade

Little Snitch Mini

Features Compare

Other Products

LaunchBar Micro Snitch IAP Viewer

Resources

Internet Access Policy Blog Support Contact Us Lost License

Resources

Internet Access Policy Blog Support Contact Us Lost License

Company

About Us Press Privacy Policy Terms

 

Little Snitch

LaunchBar

© 2025 Objective Development Software GmbH

EnglishDeutsch