Skip to main content

Reporting Security Vulnerabilities

If you identify a security issue, please contact us at tech@spotflow.one and include the following details:
  • Description: A clear and concise explanation of the vulnerability.
  • Steps to Reproduce: Detailed, easy-to-follow instructions to replicate the issue.
  • Impact: The potential risk or harm that could arise from the vulnerability.
  • Suggested Mitigations: (Optional) Your recommendation on how to fix the issue.

How We Handle Reports

  • Acknowledgment: Our technical team will confirm receipt of your report promptly within a reasonable time frame.
  • Assessment: We review and prioritize the report based on severity, impact, and exploitability.
  • Resolution: We will provide an update on the expected resolution timeline if the issue is confirmed, already known and logged internally.
  • Follow-up: We may reach out for additional information or clarification as needed.

No Monetary Rewards (Bug Bounty Program)

Currently, Spotflow does not have an official bug bounty program. While we deeply appreciate security researchers’ efforts, we do not offer monetary rewards for vulnerability disclosures. This ensures fairness for all individuals who report similar issues.

Recognition & Appreciation

We highly value the contributions of ethical researchers. While Spotflow does not currently offer a formal, paid bug bounty program, we believe in tangible appreciation. For valid security reports, we would be delighted to consider a premium Spotflow Swag Pack/Build-Kit as a token of our sincere thanks.

Responsible Disclosure Guidelines

To ensure an ethical process and protect our platform and users, please adhere to these non-negotiable rules to avoid legal actions:
  • Do Not Publicly Disclose vulnerabilities until our team has had a reasonable time to address them.
  • Do Not Exploit the vulnerability beyond what is strictly necessary to demonstrate the issue.
  • Do Not perform any activity that could disrupt our services through denial-of-service, spamming, or similar activities.
If you have any security concerns or need further assistance, please use the contact email above.