> Credentials: Username, password, account identifier, keys, certificates, or other credentials that have been published, leaked, or exposed in some way should be reported to this program to ensure they can be properly investigated, cleaned up, and secured. Credentials are out of Scope for rewards.
> Intel’s web infrastructure, i.e., website domains owned and/or operated by Intel, fall out of Scope.
This is one of the most cataclysmic security breaches of a publicly traded company I have ever seen on this site and yet this researcher get absolutely no bounty for this incredible write-up. This researcher did the right thing, but what if next time, another one does not?
A less forgiving but equally skilled security researcher could have easily sold that on the black market.
> Intel’s web infrastructure, i.e., website domains owned and/or operated by Intel, fall out of Scope.
This is one of the most cataclysmic security breaches of a publicly traded company I have ever seen on this site and yet this researcher get absolutely no bounty for this incredible write-up. This researcher did the right thing, but what if next time, another one does not?
A less forgiving but equally skilled security researcher could have easily sold that on the black market.
...and no-one cares.