invernyx / smartcars-3-bugs

The bug tracker for the smartCARS 3 application
3 stars 0 forks source link

smartCARS 3 Bug Reports

This is the official bug report repository for smartCARS 3. You may report bugs relating to core app functionality, plugin functionality, development experience and make suggestions for new features.

Please do not report bugs relating to smartCARS 2

Reporting Bugs

Before reporting a bug, you must verify that the bug is not caused by a plugin. To do this, please disable all unverified plugins (any plugin in the app that does not have the "Verified" pill), and try to reproduce the bug.

If the bug is not caused by an unverified plugin, you should verify that your issue has not already been reported. If it has, please add a comment to the existing issue instead of creating a new one with any further information you may be able to present.

To report a bug, please create a new issue using the bug report template.

Suggesting Features

Before suggesting a feature, please verify that the feature has not already been suggested. If it has, please comment to the existing issue instead of creating a new one.

To suggest a new feature, please create a new issue using the feature request template.

Security Vulnerabilities

If you discover a security vulnerability within smartCARS 3, please create a new Security Advisory. We require lots of technical information about the vulnerability, so please do not create a public issue.

Bug Hunter Rewards Program

We have a Bug Hunter Rewards Program. You may be eligible for a reward if you discover a security vulnerability. The table of rewards is as follows:

Vulnerability Reward
Permission elevation

Examples:
- Obtaining administrative rights
- Executing tasks which usually require administrator
$25
Security Circumvention

Example:
- Bypassing obvious security controls, such as:
--Filesize limits
--Authentication
$25
Leaking sensitive or private information

Example:
- Obtaining credentials that were not intended for use
$25

The examples provided are not exhaustive

A valid vulnerability must:

If your vulnerability does not meet these requirements, you are experiencing a bug, not a vulnerability. You can report your bug here.

We will respond to all security vulnerabilities as soon as possible. Please do not disclose the vulnerability to the public until we have had a chance to respond.