Responsible
Disclosure.
We build a platform that finds other people's vulnerabilities. The fastest way to embarrass us is to find one in ours. If you do, here is exactly what to send, who reads it, and what you get back.
What counts,
and what does not.
- ◇*.cybret.ai (production marketing site)
- ◇app.cybret.ai (customer platform)
- ◇api.cybret.ai (public and authenticated APIs)
- ◇CYBRET platform integrations (GitHub, GitLab, cloud connectors)
- ◇Desktop and CLI clients distributed by CYBRET
- ◇Mobile companion app (iOS, Android)
- ◇Supply chain of the above: signed artifacts, release pipelines
- ◇Denial-of-service, volumetric, or resource-exhaustion attacks
- ◇Social engineering of CYBRET staff, customers, or vendors
- ◇Physical attacks on offices, data centers, or personnel
- ◇Missing security headers on static marketing pages absent a demonstrated impact
- ◇Self-XSS, clickjacking on unauthenticated marketing pages
- ◇Content or email spoofing issues without a working exploit (e.g. SPF notes)
- ◇Vulnerabilities in third-party services we integrate with — please report directly to the vendor
- ◇Reports produced solely by automated scanners with no manual validation
Research in good faith,
and we have your back.
If you make a good-faith effort to comply with this policy, we will consider your research authorised under this policy and the US Computer Fraud and Abuse Act, the UK Computer Misuse Act, and equivalent laws elsewhere, and we will not pursue or support legal action against you for the research covered by it.
- 01Test only accounts you own, or test accounts you are explicitly authorised to use.
- 02Do not access, modify, or destroy data belonging to other users. If you encounter any, stop and report.
- 03Do not run scans that would impact availability (rate-limit yourself to 10 req/s).
- 04Do not exfiltrate more data than is necessary to demonstrate the finding.
- 05Give us a reasonable time to remediate — the default is 90 days — before public disclosure.
- 06Tell us if you believe the finding is being actively exploited.
What we commit to
on every valid report.
We pay,
not just thank.
Bounties are paid via HackerOne. Reports received outside the HackerOne program are still eligible if accepted. We pay on severity, impact, and quality of the report — not on theoretical CVSS.
Send to security@cybret.ai.
Plaintext to security@cybret.ai is fine for now (PGP support is on the Q3 2026 roadmap). Include the following — every missing field adds a day to triage.
Title: <one-line summary> Severity: <your estimate: Critical / High / Medium / Low> Affected: <domain, endpoint, client, or artifact> Summary: <2-3 sentences, what it is, why it matters> Reproduction: 1. ... 2. ... 3. ... Impact: <what an attacker could do in practice> Mitigation: <optional — what you would change> Disclosure: <your preferred timeline and channel> Handle: <how you would like to be credited, or anonymous> Contact: <email, keybase, or HackerOne handle>
We maintain a Hall of Fame for researchers who have responsibly disclosed issues to us. With your permission, we will include your name.