We welcome and respect the efforts of security researchers who help us find security vulnerabilities.
We welcome and respect the efforts of security researchers and ethically minded individuals who help us find security vulnerabilities.
Although we currently do not maintain a formal bug bounty program, we are committed to handling reports in good faith, responding in a timely manner, and offering safe harbor under the conditions described below.
Researchers may submit vulnerabilities in our systems and services under the following constraints:
If you are unsure whether a target is within scope, please contact us before proceeding.
The following are not eligible or are explicitly disallowed:
To receive safe harbor under this policy, your research must abide by the following rules:
When you follow this policy in good faith, we commit:
You may also optionally provide a PGP key for encrypted communication.
We do not operate a formal bug bounty, we reserve the option to offer discretionary recognition or rewards (e.g. free access to our services) for exceptional reports, as well as public recognition if desired by the reporter. Any such reward is entirely at our discretion and not guaranteed.
| Version | Date | Notes |
|---|---|---|
| 1.0 | 2025-10-03 | Initial release |