Well, yes, but a lot of this is outside our control, so we do what we can do. In this particular case, we have a proof-based process, with fixes and associated test cases, that can be independently verified. Even if someone as you say found four vulnerabilities and only reported three, that's still a win, and perhaps someone else will eventually find the remaining one.

As for the security researcher identity, some prefer to remain anonymous, but I don't see how that's relevant? Note that we implement the fix - a white-hat hacker doesn't have carte blanche to change the codebase as they want, they simply provide a proof of concept, which we can check and use for our fix and tests.

5 Likes