Vulnerability Disclosure Policy
Last updated: 2026-02-10
At a glance
- Scope
*.ampliflow.com(all subdomains incl. app) andampliflow.se- Contact
- security@ampliflow.com
- Acknowledgment
- Within 3 business days
- Triage
- Within 10 business days
- Safe harbor
- Yes β no legal action for good-faith researchers
- Disclosure
- 90-day coordinated disclosure
What we're looking for
We are interested in vulnerabilities such as:
- Authentication bypass or session management flaws
- Authorization bypass or broken access control
- Cross-site scripting (XSS)
- Cross-site request forgery (CSRF)
- SQL injection and other injection attacks
- Privilege escalation
- Sensitive data or personal data exposure
What is NOT in scope
AI-generated reports are not accepted. In our experience, these produce false positives and waste time for both parties. Reports that are obviously AI-generated will be rejected without review.
Prohibited
The following activities are strictly prohibited and do not constitute valid security research:
- Social engineering (phishing) against our employees or customers
- Denial-of-service attacks (DoS/DDoS)
- Spamming
Out of scope
The following do not qualify for rewards and are generally not reviewed:
- Automated scan results without verified impact
- Vulnerabilities in third-party software we don't control
How to report
Include in your report:
- Type of vulnerability
- Steps to reproduce
- Potential impact
- Your contact information for follow-up
Our process
- Acknowledgment
- Within 3 business days we confirm receipt of your report.
- Triage
- Within 10 business days we make an initial severity assessment.
- Remediation
- Confirmed vulnerabilities are prioritized by severity and fixed as soon as possible.
- Follow-up
- We keep you informed about the status.
Safe harbor
We will not take legal action against security researchers who:
- Act in good faith and follow this policy
- Report vulnerabilities directly to us before public disclosure
- Do not exploit vulnerabilities beyond what is necessary to confirm them
- Do not intentionally access or modify other people's data
Rules of engagement
- Do not disrupt our services or harm users
- Do not access, modify, or delete other people's data
- Do not perform automated scanning without written permission
- Follow all applicable laws
Reward program
We offer rewards for qualifying security reports, at our discretion. The amount depends on severity and report quality.
We're happy to list your name or alias in our acknowledgments if you wish.
Rewards are not available for: reports that don't follow this policy, already known vulnerabilities, or issues with negligible impact.
Coordinated disclosure
We practice 90-day coordinated disclosure. Do not publish details about a vulnerability until 90 days after we have confirmed it, or until a fix has been released β whichever comes first.
Contact
Cognit Consulting AB (AmpliFlow)
Security reports: security@ampliflow.com
General inquiries: info@ampliflow.com