The author is completely dismissing [0] the
entire product
If he's looking for bug bounties (be it for cash, kudos, principles, or to see it fixed), and he finds a security bug and doesn't get a bounty, why would he keep looking?
None of these bullets are “open and shut cases”, but all are related without needing a major leap, especially the first one.
* Content spoofing / text injection
* Issues related to software or protocols not under Keybase control
* Reports of spam
* Vulnerabilities affecting users of outdated or unpatched browsers and platforms
Do I agree with their (alleged) actions? NO! But as I know several folks at Keybase personally, I’m sure there’s another side to this story and I’m willing to give them some benefit to the doubt until I hear otherwise.
That’s the problem, I feel their exclusions from bounty are too wide. This vulnerability if confirmed should be eligible for some bounty imho. That said, they published the exclusions publicly, so getting butt hurt over not getting paid when they said you wouldn’t feels a bit petty to me.
Why do you say he's butt hurt? He doesn't even mention not getting paid. The post is about Keybase not taking a security vulnerability seriously. Is it petty to warn people about an insecure product?
Fool me once, shame on you; fool me twice...