Northbeams is a security product. We take vulnerability reports seriously and we work with researchers in good faith. This page tells you exactly how to reach us, what is in scope, what protection you have, and how fast you will hear back.
01 / How to report
Email security@northbeams.com. We acknowledge every report within one business day. We aim to triage within three business days and to reach a remediation plan within ten.
Helpful things to include:
Use any reasonable encryption you prefer. We can rotate to a PGP key on request.
02 / Scope
In scope
Out of scope
03 / Safe harbor
If you make a good-faith effort to comply with this policy during your research, we will:
Good-faith means:
We do not currently run a paid bounty program. We will publicly thank researchers who report responsibly, with permission.
Vulnerability reports, vendor questionnaires, sub-processor requests, and DPA copies all go to the same address. We acknowledge within one business day.
Machine-readable: security.txt