From c2716f12ef8ee9699c573023ef68c31fdce4cc1c Mon Sep 17 00:00:00 2001 From: Mehul Mohan Date: Sun, 18 Jun 2023 13:17:52 +0530 Subject: [PATCH 1/5] chore: add Xen to security vulnerability HoF --- README.md | 21 ++++++++++++--------- 1 file changed, 12 insertions(+), 9 deletions(-) diff --git a/README.md b/README.md index c76862a..ed8b967 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ -With codedamn, we are creating a learning platform that is: +With codedamn, we are creating a learning platform that is: 👉 Interactive and fun to learn. @@ -18,27 +18,30 @@ With codedamn, we are creating a learning p **You** can contribute a lot to codedamn! If you have any feature request, bug report or anything where you see a potential improvement, [let us know](https://github.com/codedamn/core/issues) - ## 🏆 Responsible vulnerability disclosure At codedamn, we take security of the product very seriously. If you find any security vulnerability, we would be happy to list your details on the Hall of Fame section of codedamn. If you're India based, we also offer swags as a reward. In any circumstances, DO NOT perform any action which might lead to any other users' data compromise, data leak while pentesting the platform. The final decision will be made by our team to determine the scope of the attack. The following attacks are out of scope: -- Social engineering -- Anything requiring physical access to user account -- Only the following domains are under responsible vulnerability disclosure program: codedamn.com, creator.codedamn.com, mentor.codedamn.com +- Social engineering +- Anything requiring physical access to user account +- Only the following domains are under responsible vulnerability disclosure program: codedamn.com, creator.codedamn.com, mentor.codedamn.com [Report the vulnerability using this link](https://codedamn.com/contact) #### October 2021 -- [Tharun Raj](https://twitter.com/TharunRaj64) +- [Tharun Raj](https://twitter.com/TharunRaj64) #### June 2022 -- [Tharun Raj](https://twitter.com/TharunRaj64) +- [Tharun Raj](https://twitter.com/TharunRaj64) + +#### November 2022 + +- [Zack](https://github.com/X-Samurai) -#### November 2022 +#### June 2023 -- [Zack](https://github.com/X-Samurai) \ No newline at end of file +- Xen Lee From 474120bf6c3af4fddfb945e0ad25fc72460f76a9 Mon Sep 17 00:00:00 2001 From: Mehul Mohan Date: Sat, 24 Jun 2023 21:48:42 +0530 Subject: [PATCH 2/5] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index ed8b967..e0d0605 100644 --- a/README.md +++ b/README.md @@ -44,4 +44,4 @@ In any circumstances, DO NOT perform any action which might lead to any other us #### June 2023 -- Xen Lee +- [Hassan Ahmed](https://cybarriersolutions.com) From 5c59dab9506daab2dc79b8e65cd692426a654b85 Mon Sep 17 00:00:00 2001 From: Sarthak Date: Sun, 9 Jul 2023 06:02:08 +0530 Subject: [PATCH 3/5] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index e0d0605..dbda168 100644 --- a/README.md +++ b/README.md @@ -26,7 +26,7 @@ In any circumstances, DO NOT perform any action which might lead to any other us - Social engineering - Anything requiring physical access to user account -- Only the following domains are under responsible vulnerability disclosure program: codedamn.com, creator.codedamn.com, mentor.codedamn.com +- Only the following domains are under responsible vulnerability disclosure program: codedamn.com [Report the vulnerability using this link](https://codedamn.com/contact) From d0d11acaa7676e0a61d09c3667b7d46488db6406 Mon Sep 17 00:00:00 2001 From: Sarthak Date: Sun, 9 Jul 2023 06:06:20 +0530 Subject: [PATCH 4/5] docs: add debugcode.ai in the allowed domains --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index dbda168..5617843 100644 --- a/README.md +++ b/README.md @@ -26,7 +26,7 @@ In any circumstances, DO NOT perform any action which might lead to any other us - Social engineering - Anything requiring physical access to user account -- Only the following domains are under responsible vulnerability disclosure program: codedamn.com +- Only the following domains are under responsible vulnerability disclosure program: codedamn.com, debugcode.ai [Report the vulnerability using this link](https://codedamn.com/contact) From b62bce57b6b294652da87ad83db6fe9ca7057f11 Mon Sep 17 00:00:00 2001 From: Rishabh Rao Date: Tue, 25 Jul 2023 18:04:02 +0530 Subject: [PATCH 5/5] feat: add Raju Basak to HOF and update copy of docs --- README.md | 26 ++++++++++++++++---------- 1 file changed, 16 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index 5617843..9908965 100644 --- a/README.md +++ b/README.md @@ -14,34 +14,40 @@ With codedamn, we are creating a learning pl 👉 Blends video based learning with practical projects along the way. -👉 Learn industry relevant skills end to end (fullstack web development, blockchain developer, etc.) +👉 Learn industry relevant skills end to end (fullstack web development, blockchain, devops, etc.) **You** can contribute a lot to codedamn! If you have any feature request, bug report or anything where you see a potential improvement, [let us know](https://github.com/codedamn/core/issues) ## 🏆 Responsible vulnerability disclosure -At codedamn, we take security of the product very seriously. If you find any security vulnerability, we would be happy to list your details on the Hall of Fame section of codedamn. If you're India based, we also offer swags as a reward. +At codedamn, we take security of the product very seriously. If you find any security vulnerability, we would be happy to list your details on the Hall of Fame section of codedamn. If you're based in India and the vulnerability you find is deemed mission critical, we may also offer swags as a reward. In any circumstances, DO NOT perform any action which might lead to any other users' data compromise, data leak while pentesting the platform. The final decision will be made by our team to determine the scope of the attack. The following attacks are out of scope: -- Social engineering -- Anything requiring physical access to user account -- Only the following domains are under responsible vulnerability disclosure program: codedamn.com, debugcode.ai +- Social engineering +- Anything requiring physical access to user account +- Any potential vulnerability arising from a possible breach in security of one of the many technologies and services we use to run codedamn in which case there wouldn't be much we could do to mitigate the risk. -[Report the vulnerability using this link](https://codedamn.com/contact) +Only the following domains are under responsible vulnerability disclosure program: `*.codedamn.com`, `*.codedamn.app` and `debugcode.ai` + +Please report the vulnerability using [this link](https://codedamn.com/contact) #### October 2021 -- [Tharun Raj](https://twitter.com/TharunRaj64) +- [Tharun Raj](https://twitter.com/TharunRaj64) #### June 2022 -- [Tharun Raj](https://twitter.com/TharunRaj64) +- [Tharun Raj](https://twitter.com/TharunRaj64) #### November 2022 -- [Zack](https://github.com/X-Samurai) +- [Zack](https://github.com/X-Samurai) #### June 2023 -- [Hassan Ahmed](https://cybarriersolutions.com) +- [Hassan Ahmed](https://cybarriersolutions.com) + +#### July 2023 + +- Raju Basak