What We Offer
When you report a vulnerability through our responsible disclosure program:- Fast response: Acknowledgment within 2 business days
- Regular updates: We’ll keep you informed of our progress
- Coordinated disclosure: Work with you on public disclosure timing
- Public credit: Recognition in our security hall of fame (if desired)
How to Report a Vulnerability
Email your findings to security@abv.dev with the subject line:[Security] Brief description of vulnerability
Include in your report:
- Clear description of the vulnerability
- Impact and what an attacker could accomplish
- Affected components (web app, API, SDK, etc.)
- Detailed steps to reproduce
- Proof of concept (code, screenshots, or videos) if available
- Acknowledgment within 2 business days
- Regular updates on our investigation and remediation progress
- Coordination on public disclosure timing after the fix is deployed
- Public credit in our security hall of fame (if desired)
- Critical: 24-48 hours
- High: 1 week
- Medium: 2-4 weeks
- Low: Next release cycle
Scope and Guidelines
In Scope
- Web Applications: ABV Dashboard (https://app.abv.dev), authentication flows, user interfaces
- APIs: Public REST APIs at app.abv.dev, SDK communication, LLM Gateway
- Infrastructure: *.abv.dev subdomains, SSL/TLS configuration, DNS security
Out of Scope
- Physical security, social engineering, phishing
- Third-party services (AWS, ClickHouse, CDN providers, LLM providers)
- DDoS or volumetric attacks
- Already-known issues or duplicates
Legal Safe Harbor
We commit to not pursuing legal action against security researchers who:- Conduct research in accordance with these guidelines
- Report vulnerabilities promptly and responsibly
- Make a good faith effort to avoid harm
- Don’t violate laws unrelated to security research
Related Topics
Vulnerability Management
Learn how we manage and remediate vulnerabilities
Penetration Testing
See our annual third-party security assessments
Incident Response
Understand our incident response procedures
Security Overview
Return to the security overview