Vulnerability Disclosure Program
This page is intended to give security researchers clear guidelines for submitting discovered vulnerabilities to Leidos.
Maintaining the security of our networks is a high priority at Leidos. If you are a security researcher and have information about a vulnerability in a Leidos website, product or application, we want to hear from you. Information submitted to Leidos under this policy will be used for defensive purposes – to mitigate or remediate vulnerabilities in our networks or applications.
Please note, Leidos does not operate a public bug bounty program and we make no offer of reward or compensation in exchange for submitting potential issues. |
Guidelines
Leidos will deal in good faith with researchers who discover and submit vulnerabilities or indicators of vulnerabilities in accordance with these guidelines.
- Your activities are limited exclusively to –
- (1) Scanning to detect a vulnerability or identify an indicator related to a vulnerability; or
- (2) Sharing with, or receiving from, Leidos information about a vulnerability or an indicator related to a vulnerability.
- You do no harm and do not exploit any vulnerability beyond the minimal amount of verification required to prove that a vulnerability exists or to identify an indicator related to a vulnerability.
- You avoid intentionally accessing the content of any communications, data, or information transiting or stored on Leidos information system(s).
- You do not exfiltrate any data under any circumstances.
- You do not intentionally compromise the privacy or safety of Leidos, or any third parties.
- You do not intentionally compromise the intellectual property or other commercial or financial interests of any Leidos personnel or entities, or any third parties.
- You do not publicly disclose any details of the vulnerability, indicator of vulnerability, or the content of information rendered available by a vulnerability.
- You do not conduct denial of service testing.
- You do not conduct social engineering, including spear phishing, of Leidos personnel or contractors.
- You do not submit a high-volume of low-quality findings.
- If at any point you are uncertain whether to continue your research, please engage with our team.
- Do not engage in any activity that violates (a) federal or state laws or regulations or (b) the laws or regulations of any country where (i) Leidos data, assets or systems reside, (ii) Leidos data traffic is routed or (iii) the researcher is conducting research activity.
- Do not store, share, compromise or destroy Leidos or customer data. If Personally Identifiable Information (PII) is encountered, you should immediately halt your activity and contact Leidos.
- Do not initiate a fraudulent financial transaction.
- Submissions will be ignored if:
- Attacks are based on "social engineering" by employees or dealers
- Phishing attempts are used.
- Common vulnerabilities found by an automated scanner.
- CSP vulnerabilities; SSL/TLS best practices
- Denial-of-service attacks on servers and websites
- Non-reproducible vulnerabilities
- Resource Exhaustion Attacks
- Clickjacking on pages with no sensitive actions
Please note that this should not be construed as encouragement or permission to perform any of the following activities:
- Hack, penetrate, or otherwise attempt to gain unauthorized access to Leidos applications, systems, or data in violation of applicable law;
- Download, copy, disclose or use any proprietary or confidential Leidos data, including customer data; and
- Adversely impact Leidos or the operation of Leidos applications or systems.
Leidos reserves all rights or claims with respect to such activities.
Disclosure
This program does not allow disclosure. You may not release information about vulnerabilities found in this program to the public.
What you can expect from us
We take every disclosure seriously and appreciate all the time and effort that security researchers put into detecting these flaws. Leidos is committed to coordinating with the researcher as openly and quickly as possible. This includes:
- Within three business days, we will acknowledge receipt of your report.
- Leidos' security team will investigate the report and may contact you for further information.
- To the best of our ability, we will confirm the existence of the vulnerability to the researcher and keep the researcher informed, as appropriate, as remediation of the vulnerability is underway.
Legal
You must comply with all applicable Federal, State, and local laws in connection with your security research activities or other participation in this vulnerability disclosure program.
Leidos does not authorize, permit, or otherwise allow (expressly or impliedly) any person, including any individual, group of individuals, consortium, partnership, or any other business or legal entity to engage in any security research or vulnerability or threat disclosure activity that is inconsistent with this policy or the law. If you engage in any activities that are inconsistent with this policy or the law, you may be subject to criminal and/or civil liabilities.
To the extent that any security research or vulnerability disclosure activity involves the networks, systems, information, applications, products, or services of a non-Leidos entity (e.g., other Federal departments or agencies; State, local, or tribal governments; private sector companies or persons; employees or personnel of any such entities; or any other such third party), that non-Leidos third party may independently determine whether to pursue legal action or remedies related to such activities.
Leidos may modify the terms of this policy or terminate the policy at any time.
How to submit vulnerability findings
If you believe you have found a vulnerability in a Leidos website, product or application, please submit the vulnerability information to Leidos via the form below.
- Please provide a detailed summary of the vulnerability including type of issue, how it was discovered, product, version, location and configuration of software containing the bug.
- Step-by-step instructions to reproduce the issue or proof of concept.
- Possible impact.
- Suggested mitigation or remediation.
Upon submission, we will reach out to you for additional details which will be communicated through encrypted emails while using the PGP key listed below.
-
-----BEGIN PGP PUBLIC KEY BLOCK-----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=gkrg
-----END PGP PUBLIC KEY BLOCK-----