• To the best of our ability, we will confirm the existence of the vulnerability to you and
be as transparent as possible about what steps we are taking during the remediation
process, including issues or challenges that may delay resolution.
• We will maintain an open dialogue to discuss issues.
Out of Scope Vulnerabilities
• Unvalidated reports from automated scanning tools
• Any activity that could lead to the disruption of our service (DoS)
• Clickjacking on pages with no sensitive state changing actions
• Previously known vulnerable libraries without a working PoC
• Reports of insecure SSL / TLS ciphers without a working PoC
• Software library version disclosure
• Issues requiring physical access to hardware
• Any physical attempt against Great American Insurance Group property or facilities
• Flaws affecting out-of-date browsers and plugins
• Password complexity requirements, account/e-mail enumeration, or any report that
discusses how you can learn whether a given username or email address has a Great
American Insurance Group-related account
• CSP Policy Weaknesses that cannot be escalated into another vulnerability
• Email Spoofing
• Content spoofing and text injection issues without showing an attack vector/without
being able to modify HTML/CSS
• Missing security-related HTTP headers which do not lead directly to a vulnerability
• Presence of autocomplete attribute on web forms
• Missing secure cookie flags on non-sensitive cookies
• Cross-Origin Resource Sharing (CORS) Access-Control-Allow-Origin: * or accepting of
custom Origin header that do not specifically show a valid attack scenario.
• IP Address Disclosure
• Descriptive error messages (e.g. Stack Traces, application or server errors) that have no
security implications.
• Email configuration issues (SPF, DKIM, DMARC)
• OPTIONS HTTP method enabled
• Web Application Firewall Bypassing
Questions
Questions regarding this policy may be sent to vulnerability@gaig.com. We also invite you to
contact us with suggestions for improving this policy.
Safe Harbor
Any research conducted in accordance with this policy will be considered “authorized conduct”
and we will not initiate legal action against you for such authorized conduct. If we are notified