gfcrc

How to recognize a good faith cybersecurity researcher as opposed to a computer criminal

A security researcher is someone who:

  1. Finds a vulnerability in the course of other non-security research and development, such as a programmer who finds a bug in open-source code, for whom this may be the only vulnerability they ever find.

  2. Conducts general cybersecurity research, such as emerging threats and hacker activity, but whose primary job isn’t finding vulnerabilities.

  3. Hunts for vulnerabilities as a major or primary focus of their job.

Good faith behavior includes:

  1. Reports their findings to a vulnerability owner or to the public.

  2. Goes above and beyond mere discovery, including providing information for reproducing and mitigating the vulnerability.

  3. Does not intentionally damage property in the pursuit of discovering or validating vulnerabilities (viewing, copying, or disseminating data is not damage).

    a. Publicly disclosing data that is reasonably likely to harm the public interest and that was intended to be protected prior to the vulnerability being discovered, is not considered good faith behavior (even if all other tenets in this document are followed).

  4. Designs and carries out their pursuit of vulnerabilities in such a manner as to avoid, as best as possible, any intentional harm to individuals or the public.

  5. Follows local laws to the best of their ability and knowledge, including reporting and paying taxes on their income to any relevant taxation agencies.

  6. If a vulnerability owner has been nonresponsive, uses the common best practice of waiting at least:

    a. 30 days to publicly disclose a vulnerability that could harm human health or life in critical infrastructure.

    b. 60 days to publicly disclose a software or firmware vulnerability.

    c. 180 days to publicly disclose a physical vulnerability (e.g. one found in a physical lock or the firmware/hardware of an electronic access control system).

  7. In the event of no response from a vulnerability owner during the waiting period, the good faith vulnerability researcher:

    a. should disclose immediately to an escrow partner if it is a critical infrastructure vulnerability, and disclosure should be as close in time as possible to notification of the vulnerability owner.

    b. may disclose an IT/OT or physical vulnerability to an escrow partner before public disclosure, as part of good faith security research practice.

  8. In the event of a response that establishes a line of communication from a vulnerability, the good faith vulnerability researcher:

    a. Does not disclose a reported vulnerability before the agreed-upon deadline established in prior communications with the vulnerability owner so long as the vulnerability owner continues to engage with the researcher.

  9. (When the situation arises) Prioritizes the safety and health of others over financial gain and immediately reports to a relevant escrow partner, if an ICS/SCADA vulnerability found that is or could be actively harming people physically.

  10. Does not withhold the details of a vulnerability in demand for payment from a vulnerability owner. If a vulnerability owner refuses to pay or does not wish disclosure to them, makes one of three choices:

    a. publicly disclosing the vulnerability without intention of profit,

    b. disclosing to a relevant escrow partner for assistance in disclosure without intention of profit,

    c. or publicly disclosing the vulnerability without intention of profit, as publicly or privately acknowledged by the escrow partner.

Instances where good faith vulnerability research disclosures have advanced public safety and security:

a. "Will Your Airliner Get Hacked? Meet the people who are making sure it won’t." Source: https://www.smithsonianmag.com/air-space-magazine/will-your-airliner-get-hacked-180976752/

b. "BadAlloc vulnerability affects BlackBerry QNX Real Time Operating System" Source: https://www.securitymagazine.com/articles/95888-badalloc-vulnerability-affects-blackberry-qnx-real-time-operating-system

c. "CISA platform helps agencies uncover more than 1,000 cyber vulnerabilities" Source: https://federalnewsnetwork.com/cybersecurity/2023/08/cisa-platform-helps-agencies-uncover-more-than-1000-cyber-vulnerabilities/ 

Definitions & Assumptions