Last updated: 12 September 2024
Important: We have migrated our vulnerability disclosure program to Bugcrowd. Unless discussed otherwise, at this time we are no longer offering monetary rewards as part of a bug bounty. We will consider launching a bug bounty in the future.
As of 03:00 UTC 12 September 2024, reports made to dataprivacy@getvero.com will not be responded to. All vulnerability reports must now be made using the form below. Reports made using the form will be responded to.
Vero believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency and common good between Vero and Security Researchers. Together, our vigilant expertise promotes the continued security and privacy of Vero customers, products, and services.
Vero accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers and consultants. Vero defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability or confidentiality of our products and services.
Vero requests that security researchers share the details of any suspected vulnerabilities across any asset owned, controlled, or operated by Vero (or that would reasonably impact the security of Vero and our users) using the web form below. In conjuction with Bugcrowd, Vero will acknowledge receipt of each vulnerability report, conduct an investigation, and take appropriate action for resolution.
Refer to the "Target" dropdown in the submission form below for in-scope entities.
The following are out-of-scope:
developers.getvero.com
)
help.getvero.com
)feedback.getvero.com
)
status.getvero.com
)
drops.getvero.com
)calendly.com
via
www.getvero.com/demo
)
When signing up to test Vero accounts please use an email address
with one of the following domains.
wearehackerone.com
,
bugcrowdninja.com
,
maildrop.cc
or
guerrillamail.com
.