Skip to main content
Responsible Disclosures

Responsible Disclosure Policy

This policy outlines how we work with security researchers and what we expect from those who want to help us improve our security.

Download as a PDF (opens in new tab)

Our Responsible Disclosure Policy

At Aussie Broadband, the security and privacy of our customers and systems is a top priority. We know that ethical security researchers, customers, partners, and the broader cyber security community play a vital role in helping us identify and fix vulnerabilities before they can be exploited.

That’s why we’ve created this Responsible Disclosure Policy; to outline how we work with security researchers and what we expect from those who want to help us improve our security.

Who This Policy Is For

This policy is designed for:

  • Ethical security researchers and penetration testers not already engaged under contract with ABB
  • Cyber security professionals
  • Customers or users who discover vulnerabilities*
  • Technical partners or vendors

*Excluding ABB staff

If you fall into one of these groups and think you’ve found a security issue, we want to hear from you.

What You Can Test

You can conduct responsible security research on Aussie Broadband systems, products, and services that are:

  • Public-facing and internet-accessible
  • Within your authorised access level (e.g. customer or user portal access)

Not sure if something is in scope? Reach out to us first.

Rules of Engagement

We ask that you follow these rules when conducting research:

  • Act in good faith and avoid causing harm or disruption
  • Only test systems you’re authorised to access
  • Never access, modify, store, or exfiltrate customer or system data
  • Avoid denial-of-service attacks or anything that degrades service
  • Comply with all applicable laws
  • Report vulnerabilities to us as soon as reasonably possible

What’s Not Allowed

Some activities are strictly off-limits:

  • Social engineering, phishing, or impersonation
  • DoS or DDoS attacks
  • Physical attacks on property or personnel
  • Clickjacking
  • Data modification or destruction
  • Accessing accounts or data that aren’t yours
  • Uploading or linking to malware
  • Sending spam or unauthorised communications
  • Testing third-party systems
  • Using deceptive techniques to bypass security
  • Any activity that violates the law

Out-of-Scope Vulnerabilities

We appreciate all reports, but please do not report security vulnerabilities relating to missing security controls or protections that are not directly exploitable. Examples include:

  • Weak or misconfigured SSL/TLS certificates
  • Misconfigured DNS records (SPF, DKIM, DMARC)
  • Missing HTTP security headers
  • Theoretical CSRF or cross-site framing attacks
  • Automated scan results without manual validation
  • Vulnerabilities without a working exploit
  • MITM or physical access-based attacks
  • Issues requiring excessive user interaction
  • Content spoofing without HTML/CSS impact
  • CSRF on non-sensitive pages
  • Public files with no sensitive content
  • Non-sensitive cookie flags
  • Vulnerable libraries without exploit paths
  • Issues affecting outdated browsers
  • Static resources in public buckets
  • Verbose error messages or software version disclosures
  • Rate limiting issues on non-auth endpoints
  • Open redirects without security impact
  • CSV injection without exploit

How to Report a Vulnerability

If you’ve found something, send us with as much detail as possible, such as:

  • Description of the vulnerability
  • Affected URLs, services, or assets
  • Steps to reproduce
  • Proof-of-concept code or screenshots
  • Test accounts or objects used
  • Your contact details (optional)

We also ask that you:

  • Submit reports in English
  • Keep your findings confidential until we’ve resolved the issue
  • Avoid exploiting the vulnerability
  • Submit one vulnerability per report (unless chaining is necessary)

We won’t share your contact details without your permission unless required by law.

Please note: We won’t respond to messages unrelated to security vulnerabilities.

Safe Harbour

We appreciate your efforts and want to protect researchers acting in good faith. We won’t take legal action if:

  • You follow this policy
  • You avoid unauthorised access
  • You act in good faith
  • You stop testing once a vulnerability is confirmed
  • You cooperate with us on coordinated disclosure

If you’re unsure whether your actions are covered, contact us first.

Compensation

We don’t offer monetary rewards or compensation for vulnerability disclosures. Your submissions are voluntary and help us strengthen our security for everyone.

Thank you for helping us protect our customers and systems. If you believe you’ve found a security issue, please let us know.

Hall of Fame

Thank you to those who have submitted responsible vulnerability disclosures:

  • Umar Ahmed (25th June 2025)

This Responsible Disclosure Policy was last updated in November 2025.

Return to legal home page. Download a copy of our Responsible Disclosure Policy

Contact us

Report a Vulnerability

If you’ve found something, provide us with as much detail as possible

*All fields mandatory unless marked optional.

Your privacy is important to us. Please review our privacy policy (opens in a new tab) to see how we protect your information.

Optional
Optional
Optional
0/300

Your privacy is important to us. Please review our privacy policy (opens in a new tab) to see how we protect your information.