Overview

Independent security researchers play a valuable role in internet security. As a result, we encourage responsible reporting of any vulnerabilities that may be found in our site or applications. Salesforce remains committed to working with security researchers to verify and address any reported potential vulnerabilities.

As a component of responsible disclosure, Salesforce will notify potentially impacted customers when they must take action to patch or otherwise remediate a vulnerability in advance of publicly disclosing the issue and releasing a Common Vulnerabilities and Exposures (CVE®).

Please review these terms before you test and/or report a vulnerability. Salesforce pledges not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.

Thank You Contributors!

We appreciate those who share Trust as our #1 value. Check out the list of customers and users who have helped us improve our overall security posture at Salesforce.

View the List of Security Research Contributors >

Learn More About Our Policy

  • Testing for Security Vulnerabilities

    Whenever a Trial or Developer Edition is available, please conduct all vulnerability testing against such instances. Always use test or demo accounts when testing our online services. For information about security assessments, requirements, restrictions, and scheduling, review Vulnerability Assessment and Penetration Test.

  • Reporting a Potential Security Vulnerability

    Privately share full details of the suspected vulnerability with the Salesforce Security team so we can validate and reproduce the issue.

  • Salesforce Does Not Permit the Following Types of Security Research

    While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:

    • Performing actions that may negatively affect Salesforce or its users (e.g. Spam, Brute Force, Denial of Service…)
    • Accessing, or attempting to access, data or information that does not belong to you
    • Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you
    • Conducting any kind of physical or electronic attack on Salesforce personnel, property or data centers
    • Social engineering any Salesforce service desk, employee or contractor
    • Conduct vulnerability testing of participating services using anything other than test accounts (e.g. Developer or Trial Edition instances)
    • Violating any laws or breaching any agreements in order to discover vulnerabilities
  • The Salesforce Security Team Commitment

    We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the Salesforce security team and associated development organizations will use reasonable efforts to:

    • Respond in a timely manner, acknowledging receipt of your vulnerability report
    • Provide an estimated time frame for addressing the vulnerability report
    • Notify you when the vulnerability has been fixed

Report a Security Concern

As a leading software-as-a-service and platform-as-a-service provider, Salesforce is committed to setting the standard in safeguarding our environment and customers’ data. Partner with us by reporting any security concerns.

Report a Concern