docs/contributing/reporting-security-vulnerabilities.md
If you believe you’ve identified a security vulnerability in Zulip, please contact our security team as soon as possible! Responsible disclosure helps us keep our user community safe.
Since Zulip is 100% open-source software, security researchers have full access to Zulip’s codebase. To learn about Zulip’s security model, check out:
Join our low-traffic release announcements mailing list to get notified about new security releases.
To allow us to responsibly remediate security issues, please do not report them publicly on GitHub, in the Zulip development community, or anywhere else. Thank you for helping us protect Zulip’s user community!
Contact Zulip’s security team at [email protected] or via our HackerOne disclosure program. Reach out to [email protected] for an invitation to the program.
Please include the following information in your report:
You are welcome to use automated tools, including AI, to research vulnerabilities. However, please take the time to personally verify the issue, and write the vulnerability description yourself to avoid errors. Reporting “vulnerabilities” that were hallucinated by AI wastes the time of open-source maintainers.
main branch and the release branch for the
current major release series.Please do not publicly disclose an issue prior to us notifying you that a fix has been released, or share exploit code that might be used against self-hosted instances that have not yet upgraded to the patched version.
/devlogin; see also /devtools features), but those
features use a separate URL namespace, so it's easy to determine if
you're accidentally using one. Historically, the vast majority of
security issues found in Zulip could be reproduced in the
development environment.zulip/ and kandra/ (Zulip Cloud) configurations are in scope.zproject/urls.py and the files it includes are a reference for the endpoints
supported by the software, most of which are detailed in the API
documentation.Zulip operates a private HackerOne disclosure program.
Security issues must be reported for the latest
release
or the main branch.
The following are out of scope for this program:
Penetration testing against specific production installations of
Zulip. Do not test against an installation of Zulip that you do
not own. This includes chat.zulip.org, zulipchat.com, and any
other existing install you might find. If you see a configuration
that appears to be risky with Zulip Cloud, please report the issue;
we will do the testing.
Vulnerabilities in third-party libraries are in scope only if they can be fixed by upgrading the version of the third-party library used by Zulip, the library is unmaintained, or you otherwise have a reason to believe we can help get the vulnerability fixed sooner.
Issues that only affect the Zulip development environment must explain how they violate the security model for the development environment.