Sigma is committed to the security and protection of our products, services, customer data, and infrastructure. We recognize the value of engaging with external security researchers in identifying and mitigating security vulnerabilities.
We will appreciate a responsible submission if you believe you’ve found a security vulnerability in a Sigma Computing product. You can submit a detailed description of the issue to us, including the steps that we can take to reproduce the issue and/or a proof-of-concept (“Report”).
We ask that reporters honor responsible disclosure principles and processes while engaging with us in order for Sigma to evaluate, respond to, or remediate any confirmed security vulnerabilities before public or third-party disclosure.
Sigma believes in responsible reporting and disclosure, and we ask the following:
This policy applies to all the products, services, and infrastructure developed, managed, and maintained by Sigma Computing.
Certain vulnerabilities are considered out of scope and include the following:
If you encounter any of the below on Sigma Computing systems while testing within the scope of this policy, stop your test and notify us immediately:
If you believe you have discovered a security vulnerability issue, please share the details with Sigma Computing by filling the form below.
Sigma Computing will try to acknowledge receipt of your report within 2 business days, provide you with an estimated timetable for resolution of the vulnerability, notify you when the vulnerability is fixed, and, with your permission, publicly acknowledge your responsible disclosure.
Email communication between you and Sigma Computing, including without limitation, emails you send to Sigma Computing reporting a potential security vulnerability, should not contain any of your proprietary information. The contents of all email communication you send to Sigma Computing shall be considered non-proprietary. Sigma Computing, or any of its affiliates, may use such communication or material for any purpose whatsoever, including, but not limited to, reproduction, disclosure, transmission, publication, broadcast, and further posting.
Further, Sigma Computing and its affiliates are free to use any ideas, concepts, know-how, or techniques contained in any communication or material you send to Sigma Computing for any purpose whatsoever, including, but not limited to, fixing, developing, manufacturing, and marketing products. By submitting any information, you are granting Sigma Computing a perpetual, royalty-free and irrevocable right and license to use, reproduce, modify, adapt, publish, translate, distribute, transmit, publicly display, publicly perform, sublicense, create derivative works from, transfer and sell such information.
Sigma is unable to award a bounty to reporters who reside in a country that has been deemed sanctioned by the United States. Sigma employees or previous employees (within the last six months), contractors, and their family members are not eligible for bounties.
Testers should create a dedicated testing account by going to https://staging.sigmacomputing.io/public-vdp or https://staging.sigmacomputing.io/public-vdp-2 and creating an account using a gmail, yahoo, hotmail or protonmail email address. Specify your testing account name with the prefix “bugbounty-“. Once you have access to the instance, please view the workspaces or templates section for further details.
For any questions on the policy and for further help, please write to us at security@sigmacomputing.com
Note: Sigma Computing reserves the right to update the policy at any time.