Security
At Vulnotes, we take security seriously. We welcome and appreciate responsible security research to help us keep our platform and users safe.
Responsible Disclosure Policy
We encourage security researchers to help us identify vulnerabilities in our platform. If you believe you've found a security issue, we ask that you follow these guidelines:
What is allowed
- Testing for vulnerabilities on your own account and data
- Reporting vulnerabilities through our designated channel
- Giving us reasonable time to address the issue before public disclosure
- Acting in good faith to avoid privacy violations, data destruction, or service disruption
What is strictly prohibited
- Accessing, modifying, or deleting other users' data: never interact with accounts or data that do not belong to you
- Disrupting the platform's availability: do not perform denial-of-service (DoS/DDoS) attacks or actions that degrade performance for other users
- Social engineering or phishing: do not target Vulnotes employees, contractors, or users
- Automated scanning at scale: avoid aggressive automated testing that could impact service stability
- Exfiltrating sensitive data: if you discover exposed data, report it immediately without copying or storing it
- Public disclosure before resolution: allow us reasonable time (typically 30 days) to fix the issue before disclosing publicly
- Exploiting vulnerabilities beyond proof of concept: demonstrate the issue without causing harm
Scope
The following are in scope for security testing:
*.vulnotes.com: main website and subdomainsyour-workspace.vulnotes.app: your own SaaS instance only- Vulnotes API endpoints
- Self-hosted Docker images (your own deployment)
The following are out of scope:
- Third-party services and integrations
- Physical security attacks
- Social engineering attacks
- Attacks requiring physical access to a user's device
How to Report a Vulnerability
If you've discovered a security vulnerability, please report it to us via email:
Please include in your report:
- A detailed description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any proof-of-concept code or screenshots
- Your contact information for follow-up
We will acknowledge receipt of your report within 48 hours and aim to provide an initial assessment within 7 days.
Recognition
While we do not currently offer a paid bug bounty program, we deeply appreciate the contributions of security researchers. As a token of our gratitude:
- Valid reports will be acknowledged in our Hall of Fame below
- We will credit you (with your permission) when we disclose fixed vulnerabilities
- Researchers who follow our guidelines will not face legal action for their good-faith efforts
Hall of Fame
We thank the following security researchers for their responsible disclosure and contribution to making Vulnotes more secure.
No entries yet. Be the first to responsibly disclose a vulnerability and get recognized here.
Contact
For security-related inquiries, please contact us at:
Vulnotes Security Team
Email: contact@vulnotes.com