Trust Center

Responsible disclosure.

If you've found a security issue in CartonFlow, we want to hear from you. This page tells you how to report it, what we'll do in response, and the legal protections we offer for good-faith research.

Last updated: May 2, 2026  ·  Effective: May 2, 2026

TL;DR

Email [email protected] with details. Don't access data that isn't yours. We'll respond within 2 business days, work with you on a fix, and won't pursue legal action against good-faith research conducted within this policy.

1. How to report

The fastest way to reach the security team is by email:

Primary contact[email protected]
Response SLA2 business days
LanguagesEnglish

Please include in your report:

2. Scope

✓ In scope

  • app.cartonflow.io and its API endpoints
  • cartonflow.io marketing site
  • Authentication and session handling
  • Tenant-isolation issues
  • Privacy Mode encryption flaws
  • Stored XSS, SSRF, IDOR, SQL injection
  • Subscription / billing logic flaws

✗ Out of scope

  • Denial-of-service or volumetric attacks
  • Social engineering of staff or customers
  • Physical attacks against our offices or vendors
  • Issues in third-party services (report to that vendor)
  • Missing security headers without demonstrated impact
  • Self-XSS or clickjacking on non-sensitive pages
  • Findings from automated scanners with no PoC

3. Rules of engagement

To stay within this policy and our safe-harbor protections:

4. What we promise in return

5. Remediation SLAs

6. What happens after you report

  1. Day 0–2: We acknowledge receipt and assign a tracking ID.
  2. Day 2–5: Reproduce, triage, and confirm severity.
  3. Day 5+: Patch development. We may ask clarifying questions or share a draft fix for you to verify.
  4. Patch ships: We deploy the fix and notify you. If the issue affected customers, we send breach-notification emails per our 72-hour SLA.
  5. Public credit: Once fixed, we add you to our security acknowledgments page (with your permission).

7. Safe harbor

CartonFlow will not pursue civil or criminal action against researchers who:

If a third party brings legal action against you for activities conducted within this policy, we will make our position public on your behalf.

8. Recognition

We don't currently run a formal paid bounty program, but we offer discretionary recognition for confirmed, well-documented vulnerabilities — based on severity, exploitability, and report quality. Researchers who follow this policy are also publicly credited (with their consent) on our Trust Center.

A formal bounty program is on our roadmap as we grow.

9. Contact

For all security-related correspondence: [email protected]

For non-security questions, please use support.

© 2026 CartonFlow by Pevara Systems