Ensuring the safety and security of our products is a top priority, and we appreciate all efforts and research that is done to discover and responsibly disclose vulnerabilities in our products.
If you identify a vulnerability in any of our services, please report it as soon as possible via the form below following our disclosure guidelines.
Alternatively, you can email the report to us at vulnerability[ @ ]ml.mercari.com and use the PGP key specified below.
Responsible Disclosure
We take all disclosures very seriously and will do our best to promptly verify the vulnerability and respond to reporters. The security team will take steps to remediate confirmed vulnerabilities as soon as possible and will keep the reporter updated on the remediation process. Please do not disclose any vulnerabilities identified through this program to third parties without express consent from the Mercari Group.
Submission Guidelines
- Provide detailed reports with reproducible steps. Reports lacking sufficient details will not be accepted.
- Submit an individual report for each vulnerability, unless you need to include multiple vulnerabilities in a single report to demonstrate the impact of the issue you are reporting.
In order for us to conduct a thorough examination of reported vulnerabilities, please include the following in your report where applicable:
- Your name and contact email
- We may use this information to follow up with you on additional details on the vulnerability
- Version and OS (iOS, Android, web) of the app affected
- Vulnerability type and category
- Description of potential vulnerability
- Steps to reproduce the issue
- Include screenshots and/or video if possible
- Proof of Concept (PoC)
- Anticipated behavior or workaround
- Disclosure plans, if any
- We will do our best to remediate vulnerabilities as quickly as possible and we ask that reporters refrain from making disclosures until the remediation is complete
Program Rules
- Do not disclose any potential or confirmed vulnerabilities identified through this program to third parties without express consent from the Mercari Group
- You must comply with all applicable laws and regulations while conducting your security research activities and participating in this program
- You must allow us a reasonable time to investigate and respond prior to contacting anyone else about potentially discovered vulnerabilities
- If your submission potentially or actually relates to a Mercari third-party vendor, Mercari reserves the right to forward your submission to the affected party
- Social engineering (e.g. phishing, vishing, smishing) is strictly prohibited and is not recognized by our vulnerability report window
- Do not exploit the vulnerability beyond the extent necessary for the vulnerability confirmation
- Do not engage in any activity that could harm the Mercari Group, our customers, or our employees
- Do not engage in any activity that can negatively impact the Mercari Group services or assets
- Do not attempt to interact with accounts you do not own
- Do not initiate or facilitate any fraudulent transactions
- Do not conduct any further tests and inform us immediately if you discover any sensitive information (PII, financial information, etc), do not disclose sensitive information to third parties
- Do not exfiltrate, modify, or delete any data from our systems, and do not make changes to systems
Out of Scope Vulnerabilities
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
- Any physical attempts against Mercari Group property (infrastructure, facilities, offices, data centers, etc…)
- Social engineering (including phishing) of Mercari Group staff or contractors
- Any activity that could lead to the disruption of our service (DoS, DDoS, etc.)
- Public zero-day vulnerabilities that have had an official patch for less than 30 days will be awarded on a case-by-case basis
- Third-party API keys/secrets embedded in mobile applications, without a clear impact, as many third parties require this for their own client attribution purposes
- Issues regarding any applications that are not directly owned by us
- Issues regarding out-of-date versions of our applications
- User enumeration attacks – unless you can demonstrate that we don’t have any rate limiting in place to protect our users
- Password reuse attacks – unless you can demonstrate that we don’t have any rate limits in place to protect our users
- Open redirect – unless additional security impact beyond simple redirect abuse can be demonstrated (e.g. the use of redirects for phishing alone is not deemed to be of sufficient impact)
- Broken Link Hijacking – unless additional security impact beyond simple redirect abuse can be demonstrated (e.g. the use of redirects for phishing alone is not deemed to be of sufficient impact)
- Clickjacking on pages with no sensitive actions
- Missing or misconfigured security headers without proof-of-concept demonstrating exploit (content-security-policy, public-key-pins, x-xss-protection, x-content-type-options, x-frame-options, HSTS, etc.)
- Host header injection – unless an additional security impact can be demonstrated
- Previously known vulnerable libraries without a working proof-of-concept
- Missing best practices in Content Security Policy
- TLS/SSL version, configuration, weak ciphers, or expired certificates
- Lack of HTTPOnly or Secure flags on non-session cookies
- Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions
- Lack of a captcha on forms with no sensitive actions
- Bruteforcing of the login form without bypassing SMS OTP or other authentication methods
- Self-XSS
- Autocomplete enabled
- Tab-nabbing
- Spamming
- Comma Separated Values (CSV) injection without demonstrating a vulnerability
- Missing email best practices (Invalid, incomplete or missing SPF/DKIM/DMARC records, etc.)
- Software version disclosure / Banner identification issues / descriptive error messages or headers (e.g., stack traces, application, or server errors) unless an additional security impact can be demonstrated
- Unrestricted file uploads without a clear impact, beyond resource consumption, DoS, undesirable content, etc…
- Homographs, RTLO, or other types of UI issues
- GPS spoofing – unless an additional security impact can be demonstrated
- Leverage black hat SEO techniques
- Account squatting by preventing users from registering with certain email addresses
- Issues that require unlikely user interaction unless an additional security impact can be demonstrated
- Unconfirmed reports from automated tools & vulnerability scanners
- Unauthenticated cache purging
- Misconfigurations and vulnerabilities in 3rd party services
Secure Communications
If you are unable to use our vulnerability report form and would like to secure your email communications with us, please use the following PGP key:
-----BEGIN PGP PUBLIC KEY BLOCK-----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=A4SH
-----END PGP PUBLIC KEY BLOCK-----
Rewards
Currently, we do not offer any remuneration for vulnerability reports. However, for valid reports, we may offer rewards such as swag or novelty goods (t-shirts, etc.) as a small token of our appreciation.
Please note that due to factors beyond our control (e.g., local import laws, shipping restrictions, and international logistics), we may be unable to deliver these rewards to certain countries.
If we receive duplicate reports (i.e. a report of an issue we are already aware of), only the first report will be rewarded (provided that it can be fully reproduced).
Safe Harbor
Mercari Group will not pursue legal action related to your activities of identifying vulnerabilities as long as you follow the responsible disclosure guidelines outlined above. Mercari Group reserves all legal rights in the event of non-compliance with these guidelines. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for your responsible disclosure and for helping to keep Mercari users safe and secure!