Does Scanii have a security vulnerability disclosure program?
Our Commitment to Security
Securing a modern Software as a Service application requires collaboration across the security community. We welcome and value external security research to help us protect our users and maintain the highest security standards.
Whether you're a security researcher, an independent firm, or a developer who's discovered a potential vulnerability, we take every report seriously and will investigate thoroughly.
Scope
In-Scope Domains
The following domains are within scope for security research:
- www.scanii.com
- api-us1.scanii.com
- api-eu1.scanii.com
- api-eu2.scanii.com
- api-ap2.scanii.com
- api-ap1.scanii.com
- api-ca1.scanii.com
Note: docs.scanii.com uses a third-party service and is not in scope for this program.
Out-of-Scope Issues
⛔ Please review the list below carefully before submitting a finding
Please review these exclusions carefully before submitting a report:
- Denial of service (DoS/DDoS) vulnerabilities
- Rate limiting issues
- Spam reports
- Social engineering attacks
- Self-XSS (cross-site scripting requiring user action on their own account)
- Content or text spoofing without authentication bypass
- Missing SPF, DMARC, or DKIM records
- Hyperlink injections happening outside of our product
- Unconfirmed automated scanner reports without manual verification
- Server or software version disclosure alone
- Session management issues when credentials are already compromised (e.g., password reset links not expiring immediately, MFA enrollment not invalidating sessions)
- Theoretical security concerns without proof of exploitability (e.g., missing headers, missing rate limits)
- Issues affecting only outdated or unsupported browsers
- User or merchant enumeration
- Best practice violations without a valid exploit (e.g., weak TLS cipher availability)
- Payment processing issues (handled by our third-party payment provider)
- Reports without a clear malicious exploitation scenario
- Issues related to gmail aggressively converting text into hyperlinks
Reporting a Vulnerability
How to Submit
- Email security@uvasoftware.com with:
- A detailed description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Your contact information for follow-up questions
- Response Timeline: We will acknowledge receipt within 48 hours and provide an initial assessment. Our team will investigate the reported vulnerability and determine the severity and impact.
- Resolution & Disclosure: Once we've addressed the vulnerability, we will coordinate disclosure with you. We will not publicly disclose your information without your explicit consent.
Rewards
We offer monetary rewards for valid security vulnerabilities based on severity:
- Low Severity: $100 USD
- Medium Severity: $250 USD
- High Severity: $500 USD
Reward amounts are determined at our discretion based on impact, exploitability, and affected systems.
Rules of Engagement
To ensure safe and responsible security research, please do not engage in:
- Denial of service or degradation of service attacks
- Spamming or mass exploitation
- Social engineering, phishing, or physical security attacks against Uva Software staff, contractors, or facilities
- Accessing or modifying data belonging to other users
- Any destructive testing that could impact service availability
Coordinated Disclosure
We are committed to coordinated vulnerability disclosure:
- We ask for reasonable time to investigate and remediate reported vulnerabilities before public disclosure
- We will keep you informed throughout the remediation process
- We will credit you for your discovery (with your permission) in any public disclosures
Contact
For security vulnerability reports: security@uvasoftware.com
Thank you for helping us keep Scanii secure.
— The Scanii Team