We value the contributions of security researchers who help keep Sensfrx's platforms secure
We value the contributions of security researchers who help keep Sensfrx's platforms secure
Exclusive Sensfrx Bug Hunter t-shirts for valid vulnerability reports
Get recognized on our security researcher hall of fame
Public acknowledgment of your contributions to Sensfrx's security
Clear guidelines for security researchers
Domains & Web Applications
Customer dashboard (dashboard.sensfrx.ai)
API endpoints (api.sensfrx.ai)
Sensfrx WordPress plugin (latest version)
Sensfrx WooCommerce integration (latest
version)
Sensfrx WHMCS module (latest version)
Sensfrx WISECP integration (latest
version)
Attacks targeting Sensfrx employees through phishing, vishing, or other social engineering techniques.
Any testing that impacts the availability of our services or causes degradation of service.
Services not directly managed by Sensfrx (except for our official integrations listed in scope).
Unless they directly lead to another vulnerability with security impact.
Only the latest versions of our software and integrations are in scope.
Only test against accounts you own or have
explicit permission to test
Do not access, modify, or delete data that
does not belong to you
Do not attempt to exfiltrate data from the
systems
Do not use automated scanners that may
affect system availability
Do not disclose any vulnerability to the
public or third parties before it has been fixed and approved for disclosure
Provide a reasonable time for remediation
before any disclosure
Coordinate disclosure timing with the
Sensfrx security team
Provide detailed reproduction steps that
allow us to replicate the vulnerability
Include screenshots, videos, or proof of
concept code where applicable
Explain potential security impact and
attack scenarios
Vulnerabilities that cause a direct and immediate impact on the confidentiality, integrity, or availability of customer data or Sensfrx systems. Examples: Remote code execution, authentication bypass affecting all users.
Vulnerabilities that have a significant impact but may require additional steps or specific conditions. Examples: SQL injection, stored XSS in commonly used features, CSRF with significant impact.
Vulnerabilities that have some security impact but are limited in scope or require unlikely conditions. Examples: Reflected XSS with limited impact, sensitive information disclosure affecting limited users.
Vulnerabilities with minimal security impact or requiring highly specific conditions. Examples: Self-XSS, CSRF with minimal impact, minor information leakage.
Sensfrx provides safe harbor for security researchers who:
Engage in security research in accordance
with this policys
Make a good faith effort to avoid privacy
violations, destruction of data, and interruption or degradation of our services
Report vulnerabilities directly to us and
keep information about discovered vulnerabilities confidential until we remediate them
We will not pursue civil action or initiate a complaint to law enforcement for security research conducted in accordance with this policy. If legal action is initiated by a third party against you for activities that were conducted in accordance with this policy, we will make it clear that your actions were conducted in compliance with this policy.
The following activities are not covered by the safe harbor provisions:
Testing that impairs or damages
the systems
or data
Social engineering attacks
against our
employees
Physical attacks against our
offices, data
centers, or employees
Testing of systems or
activities not
covered in the scope
Types of security issues we're particularly interested in
Please use this template when submitting vulnerability reports
When submitting a vulnerability to [email protected], please include the following information:
Subject: [Sensfrx Bug Bounty] - [Vulnerability Type] - [Affected Component] ## Vulnerability Details - Vulnerability Type: - Affected URL/Component: - Severity (Critical/High/Medium/Low): ## Description [Detailed description of the vulnerability] ## Impact [Describe the potential security impact] ## Proof of Concept [Code, screenshots, or videos demonstrating the vulnerability] ## Suggested Mitigation [Optional: Your recommendations for fixing the issue] ## Description [Detailed description of the vulnerability]
Questions you might ask about our products are services.
Questions you might ask about our products are services.
You can submit your bug reports via email to [email protected]. Make sure to include detailed reproduction steps, impact assessment, and any relevant screenshots or videos. Our security team will review your submission and respond accordingly.
We reward researchers for discovering security issues such as XSS, CSRF, SQL injection, authentication bypasses, authorization flaws, and other vulnerabilities that could impact our users' security or privacy. Vulnerabilities in our marketplace integrations (WordPress, WooCommerce, WHMCS, WISECP) are also eligible.
We aim to review all submissions within 5 business days. Complex issues may take longer to validate. You'll receive updates on the status of your report throughout the process.
No, please only test systems that are explicitly listed in our scope (*.sensfrx.ai domains and our marketplace integrations). Testing out-of-scope systems may violate our terms and applicable laws.
T-shirts are shipped within 30 days after a vulnerability is validated and fixed. We'll contact you for shipping details once your report qualifies for a reward.
Currently, our bug bounty program offers recognition and swag (t-shirts) as rewards. We do not offer monetary compensation at this time, but we highly value the contributions of security researchers and acknowledge them in our Hall of Fame.
We're currently working on implementing PGP encryption for our vulnerability reports. In the meantime, please avoid including highly sensitive information in your initial report. After we acknowledge your submission, we can establish a secure communication channel for sharing additional details if needed.
We are committed to the following response times:
We follow a coordinated disclosure process:
For testing our marketplace integrations:
Documentation for all integrations is available at docs.sensfrx.ai/integrations .
Join our community of security researchers and help us build a more secure Sensfrx platform
Have questions about our program? Contact us at [email protected]