We work with the security community to keep our customers safe. This document defines what is in scope, what is not, and how we respond when you tell us about a vulnerability.
We believe good-faith security research benefits everyone. If you follow this policy, we will not pursue legal action against you, and we will work with you to understand and resolve the issue.
If you act in good faith, stay within the stated scope, and make a reasonable effort to avoid privacy violations, data destruction, or service disruption, we consider your research to be authorised under this policy.
We commit to the following response times once a valid report is received at the contact address below.
| Stage | Target | What we deliver |
|---|---|---|
| Acknowledgement | Within 24 hours | A human reply confirming receipt. |
| Initial triage | Within 72 hours | Severity rating and a tracking reference. |
Participation in this programme is voluntary. By submitting a report, you confirm all of the following.
The following asset is in scope. Please verify that the target is owned and operated by TrustStrike Labs before testing.
| Asset | Type | Environment |
|---|---|---|
*.truststrikelabs.com | Web applications and infrastructure | Production |
The following categories are excluded from the programme. Testing in these areas may result in disqualification and, where appropriate, legal action.
Send a detailed report to the contact address below. Please include the sections listed; complete reports are triaged significantly faster.
Your report should contain the following.
This programme does not offer monetary bounties at this time. We recognise valid reports through our public Hall of Fame, with your chosen name, handle, or affiliation, once the issue is fully remediated and you have approved public disclosure.