Responsible Disclosure
Last updated: Oct 23nd, 2025
Our Commitment to Security
At 7shifts, the security of our systems and the protection of our customer data is a top priority. We value the crucial role the security research community plays in helping us stay secure. This policy explains how to report vulnerabilities to us, what you can expect from us, and how we can work together to protect our users.
Our Responsible Disclosure Program is facilitated through Inspectiv, a private bug bounty platform.
How to Report a Vulnerability
We have two distinct channels for submitting your findings. Please choose the one that best fits your situation.
- For Bug Bounties (Seeking Compensation): If you are seeking a monetary reward for your findings, you must be a registered researcher with Inspectiv.`
- To Submit: Register and submit your findings through the official 7shifts Bug Bounty Program on Inspectiv.
- Sign up here: https://www.inspectiv.com/researchers
- For Voluntary Disclosure (Not Seeking Compensation): If you are not seeking compensation but wish to report a vulnerability for the good of the community, please use our voluntary disclosure form.
- Submit here: https://client.inspectiv.com/vdp/7shifts/submit-report
Scope
This policy applies to any digital assets owned, operated, or maintained by 7shifts. To help you focus your efforts, we have defined what is in and out of scope.
In-Scope Assets
- Mobile Applications
- API Endpoints
- Web Portal
Out-of-Scope Assets & Activities
- Any domains, subdomains, or services not explicitly listed in the “In-Scope” section.
- Third-party services or vendors used by 7shifts.
- Social engineering (e.g., phishing), physical attacks, or testing that targets our employees, offices, or data centers.
- Activities that could disrupt our service (Denial of Service, spamming, etc.).
Excluded Vulnerability Types
We generally do not award bounties for vulnerabilities that have no demonstrable security impact. While we encourage you to report anything you find, the following are examples of issues that are not eligible for a reward through our bug bounty program:
- Reports from automated scanners without a validated proof-of-concept.
- Missing security best practices (e.g., missing HTTP security headers, SPF/DKIM records, weak SSL cipher suites) without proof of a real-world vulnerability.
- Disclosure of known-public files or software versions.
- Clickjacking on pages without sensitive actions.
- Username/email enumeration.
- Self-XSS and other issues requiring unlikely user interaction.
For a complete and detailed list of excluded vulnerability types, please review the full program policy on the Inspectiv platform.
Program Rules & Expectations
To ensure our program is safe and effective for everyone, we require all researchers to adhere to the following rules:
- Report promptly: Let us know as soon as you discover a potential vulnerability.
- Avoid harm: Do not disrupt our systems, destroy data, or violate the privacy of our users. If you encounter any user data (PII, PHI, etc.), stop immediately and report it.
- Test responsibly: Only interact with test accounts you own. Do not perform testing that violates laws or compromises data that is not your own.
- Maintain confidentiality: Provide us a reasonable amount of time (at least 180 days) to resolve an issue before you disclose it publicly. Do not discuss vulnerabilities through unofficial channels.
- No extortion: Do not engage in any form of extortion or threats.
Security researchers that are participating in our bug bounty program, which is managed by Inspectiv, will be required to agree to Inspectiv’s rules, terms, and conditions. Sign up at https://www.inspectiv.com/researchers.
Safe Harbor
We consider security research conducted under this policy to be authorized. We will not initiate or support legal action against you for good-faith, accidental violations of this policy, provided you comply with all applicable laws and adhere to the guidelines outlined herein.
Our Process & Timelines
Once you submit a report, here’s what you can expect from us:
- Initial Response: We will do our best to reply to your initial report within 48 hours.
- Updates: We will provide updates on our progress at reasonable intervals.
- Public Disclosure: We ask for at least 180 days to remediate a vulnerability before public disclosure. We will coordinate with you to ensure our public disclosures are posted at the same time.
Rewards
Monetary bounties are available for valid, in-scope vulnerabilities submitted through our official bug bounty program which is managed by Inspectiv. Payouts are based on the severity of the vulnerability and the criticality of the affected asset.
Note: The “Tiers” below correspond to the criticality of the asset you are testing. A detailed overview of which assets fall into which tier is available on the Inspectiv platform. See https://www.inspectiv.com/researchers.
| Severity | Tier 1 | Tier 2 | Tier 3 |
| Critical | $500 | $1,000 | $2,500 |
| High | $250 | $500 | $1,000 |
| Medium | $100 | $250 | $500 |
| Low | $50 | $100 | $200 |
Severity is determined by Inspectiv’s triage team based on impact and the privileges required to exploit the vulnerability. For more detail on the rating process, please refer to the documentation within the Inspectiv platform.
Frequently Asked Questions (FAQ)
What information should I include in my report?
Please include a clear description of the vulnerability, steps to reproduce it, potential impact, and any proof-of-concept code or screenshots that demonstrate the issue.
How long will it take to resolve my report?
Our goal is to acknowledge your report within 48 hours. Remediation timelines vary depending on the severity and complexity of the vulnerability, but we aim for resolution within our 180-day public disclosure window.
Can I publicize my findings?
We request that you allow us at least 180 days to remediate the vulnerability before public disclosure.
How long does it take to receive a bounty payment?
Once the issue is validated and resolved, Inspectiv processes payouts according to their standard schedule.