As a security company, the security and integrity of our systems is paramount. We accept the responsibility of safeguarding data that our customers’, employees’, and partners’ have entrusted to us.
A key part of our security program is responsible disclosure. We encourage and greatly appreciate security researchers to contact us to report any potential vulnerabilities found in our products or other digital assets.
If you have identified a potential security vulnerability, please share it with us by following the guidelines below. As fellow security researchers, we’d appreciate your cooperation by adhering to the following principles:
By responsibly submitting your findings to Cequence Security in accordance with these guidelines Cequence Security agrees not to pursue legal action against you. Cequence Security reserves all legal rights in the event of noncompliance with these guidelines.
Once a vulnerability report is submitted, Cequence Security commits to provide prompt acknowledgement of the receipt of the report (within three business days of submission) and will keep you reasonably informed of the status of any validated vulnerability that you report through this program.
When submitting a report of a potential vulnerability, please include a detailed summary of the vulnerability, including the target, steps, tools, and artifacts used during discovery (screen captures welcome).
Please email the report to Cequence Security at email@example.com.
Please note that Cequence does not operate a bug bounty program and we do not offer reward nor compensation in exchange for the identification of potential issues.