Vulnerability Disclosure
We welcome responsible security research to keep our platform safe.
Last Updated: 16 September 2025
Principles
- Good Faith We will not pursue legal action for good‑faith research within this policy.
- Confidentiality Do not publicly disclose a vulnerability until we have remediated or agreed to coordinated disclosure.
- Respect Avoid privacy violations, data destruction, or service disruption.
In Scope
- Public website properties under the zuvohq.com domain
- Public API endpoints documented or discoverable
- Authentication & session management flows
Out of Scope
- Physical attacks, social engineering, spam campaigns
- Denial of Service (volumetric) testing
- Automated scans causing performance degradation
- Third-party services (report directly to provider)
How to Report
Send an email to support@zuvohq.com
with the following:
- Vulnerability summary & potential impact
- Detailed reproduction steps (URLs, payloads, accounts)
- Proof-of-concept (screenshots, scripts) if safe
- Your contact for follow-up & disclosure preference
Target Response Timeline
We aim to acknowledge within 2 business days and provide remediation status updates at least every 7 days until closure.
Research Guidelines
- Avoid accessing more data than necessary to demonstrate the issue.
- Use test accounts where possible.
- Do not run automated scanners aggressively.
- No ransom, extortion, or threats.
- Cease testing immediately upon finding customer data exposure and report.
Safe Harbor
If you comply with this policy when reporting a security issue, we will consider your research authorized and will not initiate legal action. This does not extend to actions that are clearly malicious, cause harm, or involve exfiltrating personal data.
Updates
We may revise this policy. Material changes will be signaled on this page with an updated date. Continued testing after changes constitutes acceptance.
This policy does not guarantee monetary rewards or bug bounties at this time.