Skip to main content

Vulnerability Disclosure Policy

Last updated: February 16, 2026

Digitaltableteur Tmi (FI22264455-2), trading as VertaaUX, welcomes responsible security research. This policy describes how to report vulnerabilities, what is in scope, and how we protect researchers acting in good faith.

1. Safe Harbor

We consider security research conducted under this policy to be authorized and will not initiate legal action against researchers who:

  • Act in good faith and follow this policy
  • Avoid privacy violations and data destruction
  • Do not degrade service performance for other users
  • Report findings promptly and do not exploit vulnerabilities beyond what is necessary to demonstrate them

If legal action is initiated by a third party against a researcher who has acted in accordance with this policy, we will make reasonable efforts to make it known that the researcher's actions were conducted in compliance with our policy.

2. Scope

2.1 In Scope

  • vertaaux.ai — Web application and all subdomains
  • API — All endpoints at vertaaux.ai/api/*
  • CLI — @vertaaux/cli npm package
  • SDK — @vertaaux/sdk-js npm package and vertaaux-api-client PyPI package
  • MCP Server — @vertaaux/mcp-server npm package
  • GitHub Action — @vertaaux/audit-action
  • Browser Extension — VertaaUX Chrome extension
  • VS Code Extension — vertaaux-assistant

2.2 Out of Scope

  • Third-party services (Vercel, Stripe, Neon, etc.)
  • Social engineering or phishing attacks
  • Denial-of-service attacks (DoS/DDoS) against production systems
  • Physical attacks against infrastructure or personnel
  • Automated vulnerability scanning without prior approval
  • Vulnerabilities in third-party dependencies already reported upstream

3. Rules of Engagement

When researching vulnerabilities, you must:

  • Only interact with accounts you own or have explicit permission to test
  • Stop testing and report immediately if you access another user's data
  • Not modify or delete data that does not belong to your test account
  • Not perform actions that could affect other users
  • Use the minimum necessary exploitation to demonstrate the vulnerability
  • Not use automated scanning tools without prior written authorization

4. Reporting a Vulnerability

Send your report to security@vertaaux.ai with the following information:

  • Description — What the vulnerability is and its potential impact
  • Steps to reproduce — Clear, step-by-step instructions
  • Proof of concept — Screenshots, code, or video demonstrating the issue
  • Affected component — Which surface (web, API, CLI, SDK, etc.)
  • Severity assessment — Your estimate of the impact (Critical, High, Medium, Low)
  • Your contact information — For follow-up questions (name and email)

Please do not report vulnerabilities through public channels (GitHub issues, social media, etc.) before they have been resolved.

5. Response Timeline

ActionTimeline
Acknowledgment of receiptWithin 24 hours
Initial triage and severity assessmentWithin 72 hours
Status updates during investigationEvery 48-72 hours
Resolution or mitigationTarget 90 days (varies by severity)
Public disclosure (coordinated)After fix deployed, coordinated with reporter

6. Bug Bounty Program

We offer monetary rewards for valid, previously unreported vulnerabilities based on severity:

SeverityReward (EUR)Examples
Critical€500 – €2,000Remote code execution, SQL injection, authentication bypass
High€200 – €500XSS, CSRF, privilege escalation, API key leakage
Medium€50 – €200Information disclosure, insecure direct object references
Low€10 – €50Missing security headers, minor configuration issues

Rewards are determined at our sole discretion based on the severity, impact, and quality of the report. Duplicate reports receive credit but no reward. Rewards are paid via bank transfer (SEPA/international wire).

7. Recognition

With your permission, we will publicly acknowledge your contribution on our security page. If you prefer to remain anonymous, we will respect that choice.

8. Contact