Skip to content

Security: sunnypatell/securebank-ctf

Security

SECURITY.md

Security Policy

🔐 Reporting a Vulnerability

This project intentionally contains security vulnerabilities for educational use in a Capture The Flag (CTF) setting. These vulnerabilities are deliberate and designed to simulate realistic attack vectors, such as SQL injection.

However, if you discover unintended vulnerabilities (e.g., issues with cookie/session handling, exposure of developer secrets, or a flaw that breaks the app in a way not intended by the challenge), please report them privately and responsibly.

Please do not open public issues that detail active exploit paths outside of the intended CTF challenges.


✅ Responsible Disclosure Guidelines

  • Provide a clear explanation of the issue and how to reproduce it
  • Include proof-of-concept if applicable
  • Do not use this project to attempt unauthorized real-world attacks
  • Do not attempt to upload exploits, malware, or malicious payloads to the repository

🔎 Scope

This project contains intentionally unsafe code for educational exploitation. Vulnerabilities like the following are considered intentional and do not require disclosure:

  • SQL Injection in search boxes (e.g., Transactions, Feedback)
  • Feedback form tampering
  • Bypassable login forms
  • Unvalidated input on non-critical endpoints

📚 For Educational Use Only

SecureBank is a CTF teaching tool modeled after apps like OWASP Juice Shop. It is not meant for production use. Any vulnerabilities discovered should be considered in the context of intentional insecure design.


🤝 Thanks

Thanks for helping make the educational side of web security better. All responsible disclosures will be acknowledged (privately or publicly, your choice).


📅 Response Targets (Best Effort)

  • Acknowledge report: within 3 business days
  • Initial assessment: within 7 business days
  • Mitigation plan (if needed): within 14 business days

These timelines are targets for a community‑maintained project and may vary.

🛡️ Safe Harbor

We consider research conducted in good faith and within the guidelines above to be authorized. We will not pursue legal action against individuals who:

  • Report vulnerabilities privately and responsibly
  • Do not compromise data beyond what is necessary to demonstrate a vulnerability
  • Avoid privacy violations, data destruction, and service disruption

🚫 Out of Scope (Examples)

  • Denial of service that materially impacts collaborators
  • Automated vulnerability scanners without actionable details
  • Findings limited to best‑practice recommendations with no concrete impact

There aren’t any published security advisories