Our Commitment

DriveStrike is committed to ensuring the security of our customers’ data and welcomes security researchers to responsibly report any vulnerabilities found in our systems. We value the contribution of independent researchers and offer monetary rewards for eligible reports based on severity.

Safe Harbor

DriveStrike will not pursue civil or criminal action against researchers who discover and report security vulnerabilities in good faith and in compliance with this policy. We consider good-faith research to include:

  • Making a genuine effort to avoid privacy violations, service disruption, and data destruction during testing
  • Reporting vulnerabilities promptly and providing us reasonable time to remediate before any public disclosure
  • Not accessing, modifying, or exfiltrating data beyond what is necessary to demonstrate the vulnerability
  • Not conducting social engineering, phishing, or physical attacks against DriveStrike employees or infrastructure

Eligibility

To be eligible for a reward, you must:

  • Be the first to report the specific vulnerability
  • Not be a current or former DriveStrike or Spearstone employee or contractor
  • Not reside in a country subject to U.S. OFAC sanctions
  • Be of legal age in your jurisdiction

How to Report

Submit all reports to security@drivestrike.com. Please include:

  • A detailed description of the vulnerability
  • Step-by-step reproduction instructions
  • Your assessment of the potential impact
  • Any supporting screenshots, videos, or proof-of-concept code

We will acknowledge your report within 72 hours and provide a triage decision within 10 business days.

Program Scope

In scope:

  • drivestrike.com and all subdomains
  • app.drivestrike.com (the DriveStrike web application and dashboard)
  • DriveStrike iOS and Android mobile applications
  • DriveStrike Windows, Mac, and Linux device agents
  • The DriveStrike API

Out of scope:

  • Social engineering or phishing attacks targeting DriveStrike employees
  • Physical attacks against DriveStrike offices or infrastructure
  • Denial of service (DoS/DDoS) attacks
  • Vulnerabilities in third-party services or libraries outside DriveStrike’s control
  • Automated scanner findings without demonstrated real-world impact
  • Spam, email deliverability, or SPF/DKIM configuration issues
  • Rate limiting on non-sensitive endpoints

Severity and Compensation

Rewards are based on the confirmed severity and impact of the vulnerability. Final payout amounts are at DriveStrike’s discretion based on report quality and real-world risk.

Level Description Payout Range
Critical (L4) Unauthorized access to customer accounts, privilege escalation, remote code execution, or the ability to issue unauthorized commands to customer-managed devices $500 – $5,000
High (L3) Unauthorized exposure of customer data, including device location or management metadata $250 – $500
Medium (L2) Unauthorized modification of device management settings, account configuration, or customer data $100 – $200
Low (L1) Creates a customer nuisance or perception of poor security $25 – $100

Exceptional reports demonstrating significant real-world impact may receive discretionary awards above the published ranges at DriveStrike’s discretion.

Disclosure Policy

We ask that you allow us 90 days from the date of your initial report to investigate and remediate the vulnerability before any public disclosure. If a fix requires additional time, we will communicate with you and work toward a mutually agreed disclosure date.

Duplicate Reports

Only the first researcher to report a unique, previously unknown vulnerability is eligible for a reward. If your report duplicates a known issue currently under investigation, we will notify you and you will not be eligible for a reward for that finding.