Description

Anaconda is the trusted platform accelerating enterprise AI with governed open-source Python. We serve millions of users globally—from individual developers to Fortune 500 companies—powering AI/ML model development, data science workflows, and intelligent applications. Our platform provides pre-vetted Python packages, automated security scanning, and enterprise governance that helps organizations move from AI prototype to production faster, safer, and smarter. What do we do? We provide enterprise-ready AI development tools and trusted Python package management solutions. Anaconda Core delivers secure, validated open-source packages with intelligent dependency resolution. Anaconda AI Catalyst enables rapid deployment of pre-validated, optimized AI models with built-in governance. Our platform helps organizations scale AI initiatives while maintaining security and compliance standards. Intention for this program To collaborate with the community in identifying and addressing security vulnerabilities across Anaconda's infrastructure, products, and services. Your responsible disclosure helps us maintain the trust of millions of users who rely on our platform to advance their AI initiatives.

Bounties

This is a responsible disclosure program without bounties.

Rules of engagement
Not applicable
Not applicable
Not applicable
Not applicable

By participating in this program, you agree to:

  • Respect the Community Code of Conduct
  • Respect the Intigriti Terms and Conditions
  • Respect the scope of the program
  • Not discuss or disclose vulnerability information without prior written consent (including PoC's on YouTube and Vimeo)
Assets
URL
No bounty
In scope

Introduction

Thank you for your interest in helping secure Anaconda's platform. This vulnerability disclosure program covers all Anaconda-owned web properties, infrastructure, applications, and installers. We welcome reports of critical and high security vulnerabilities that could impact our users or infrastructure.


Feedback
Would you like to help us improve our program or have some feedback to share, please send your anonymous feedback here:

Program feedback link
Please note this form will be checked periodically and should not be used for submission or support queries.

Out of scope

Anaconda-Specific Exclusions

We will try our best to forward any non-Anaconda product vulnerabilities to the relevant owners.

  • Open source projects not owned/maintained by Anaconda (e.g., conda, constructor, menuinst, conda-standalone when not part of Anaconda installers)
  • Third-party dependencies with separate security programs
  • Vulnerabilities in Python itself or other language runtimes
  • Vulnerabilities in community-contributed Conda packages
  • Social engineering attacks against Anaconda employees
  • Physical security testing
  • Testing that requires persistent access to production systems
  • Tokenized/authenticated access to commercial repositories without authorization
  • Known installer issues already documented in GitHub repositories

Application

  • Windows single-user installations (not run as administrator) may have issues when uninstallation is run as administrator (registry entries, Start Menu entries remain). See conda/menuinst#341 and conda/constructor#997
  • WordPress usernames disclosure
  • Pre-Auth Account takeover/OAuth squatting
  • Self-XSS that can't be used to exploit other users
  • Verbose messages/files/directory listings without disclosing any sensitive information
  • CORS misconfiguration on non-sensitive endpoints
  • Missing cookie flags
  • Missing security headers
  • Cross-site Request Forgery with no or low impact
  • Presence of autocomplete attribute on web forms
  • Reverse tabnabbing
  • Bypassing rate-limits or the non-existence of rate-limits
  • Best practices violations (password complexity, expiration, re-use, etc.)
  • Clickjacking without proven impact/unrealistic user interaction
  • CSV Injection
  • Sessions not being invalidated (logout, enabling 2FA, etc.)
  • Tokens leaked to third parties
  • Anything related to email spoofing, SPF, DMARC or DKIM
  • Content injection without being able to modify the HTML
  • Username/email enumeration
  • Email bombing
  • HTTP Request smuggling without any proven impact
  • Homograph attacks
  • XMLRPC enabled
  • Banner grabbing/Version disclosure
  • Not stripping metadata of files
  • Same-site scripting
  • Subdomain takeover without taking over the subdomain
  • Arbitrary file upload without proof of the existence of the uploaded file
  • Blind SSRF without proven business impact (pingbacks aren't sufficient)
  • Disclosed/misconfigured Google Maps API keys
  • Host header injection without proven business impact
Severity assessment

This program follows Intigriti's triage standards based on the proof of concept.

FAQ

Where can we get credentials for testing?

You can self-register on applicable Anaconda applications.

Is this a bug bounty program?

No, this is a vulnerability disclosure program. We do not offer financial rewards for vulnerability reports at this time. We value responsible disclosure and will acknowledge your contributions to improving our security.

All aboard!
Please log in or sign up on the platform

For obvious reasons we can only allow submissions or applications for our program with a valid Intigriti account.

It will only take 2 minutes to create a new one or even less to log in with an existing account, so don't hesitate and let's get started. We would be thrilled to have you as part of our community.

Activity
12/15
Anaconda Inc updated the confidentiality level to public
12/15
Anaconda Inc updated the confidentiality level to registered
12/15
Anaconda Inc updated the confidentiality level to application
12/12
Anaconda Inc
changed the out of scope
12/12
Anaconda Inc
changed the in scope
12/11
Anaconda Inc
changed the faq
12/11
Anaconda Inc
changed the faq
12/10
Anaconda Vulnerability Disclosure Program
launched