Kaseware is committed to maintaining the security, confidentiality, and availability of our systems and customer data. We welcome responsible security research and encourage individuals to report potential vulnerabilities in accordance with our Vulnerability Disclosure Program (VDP).
This program is intended to provide clear guidelines for security researchers and to ensure reported issues are handled in a responsible, coordinated manner.
This Vulnerability Disclosure Program applies to externally accessible systems operated and maintained by Kaseware supporting its Government and Commercial SaaS environments. The following domains are in scope:
In-scope components include publicly accessible web applications and authentication workflows that enable secure user access and platform functionality.
The following are not authorized under this program:
If there is uncertainty regarding scope, please contact us before conducting testing.
Researchers must:
Testing must comply with all applicable laws and be performed in good faith.
Kaseware considers security research conducted under this policy to be authorized and performed in good faith. We will not pursue legal action against individuals who responsibly report vulnerabilities in compliance with this program, provided that such activities:
This safe harbor does not apply to activities that are malicious, reckless, or conducted outside the boundaries of this policy.
To report a potential security vulnerability, please use the secure submission form below.
[ <script async
src=”https://bugcrowd.com/6cae53da-918c-4920-9fc0-de2afdca3d5f/external/script“
data-bugcrowd-program=”https://bugcrowd.com/6cae53da-918c-4920-9fc0-de2afdca3d5f/external/report“></script>]
Upon submission:
Researchers should not publicly disclose vulnerabilities until remediation has been completed or disclosure timing has been agreed upon in writing.
This program is a vulnerability disclosure initiative and does not provide monetary rewards.
Kaseware takes reported vulnerabilities seriously as part of its ongoing security and continuous monitoring practices.