Vulnerability Disclosure Policy
Groomba takes the security of customer data seriously. If you believe you have found a
security vulnerability in Groomba, we want to hear from you. This page describes how to
report, what we ask of you in return, and what you can expect from us.
1. Scope
This policy applies to vulnerabilities discovered in any of the following:
- The Groomba web application at groomba.ai and
www.groomba.ai
- The Groomba Slack application
- The Groomba Jira Cloud OAuth integration
2. Out of scope
The following are not covered by this policy:
- Vulnerabilities in third-party services Groomba depends on (Slack, Atlassian, Stripe,
Heroku, Bugsnag, New Relic). Please report those directly to the respective provider.
- Denial-of-service attacks, volumetric testing, or any test that degrades the service for
other users.
- Social engineering, phishing, or physical attacks against Groomba staff, users, or
infrastructure.
- Findings produced by automated scanners that do not demonstrate concrete impact.
- Missing security headers or best-practice configuration items without a proven
exploitation path.
- Self-XSS, clickjacking on pages without sensitive state, and other low-impact
theoretical findings.
- Brute-force or credential-stuffing attacks against authentication endpoints.
- Issues affecting only end-of-life browsers or operating systems.
3. How to report
Email hello@groomba.ai with the subject line
"Security report" and include:
- A description of the vulnerability and its potential impact
- Step-by-step reproduction instructions
- Any proof-of-concept code, screenshots, or supporting material
- Your preferred name for any future acknowledgment (optional)
If you would like to send encrypted information, mention this in your first email and we
will respond with a PGP key.
4. What you can expect from us
- We will acknowledge your report within 5 business days.
- We will provide an initial severity assessment and remediation timeline within
10 business days.
- We will keep you informed of progress and notify you when the issue is resolved.
- With your permission, we will acknowledge your contribution once a fix is deployed.
5. Safe harbor
If you make a good-faith effort to comply with this policy during your security research,
we will consider your research authorized. We will not initiate or support legal action
against you, and we will work with you to understand and resolve the issue quickly.
Good-faith effort means:
- You report the vulnerability promptly and confidentially.
- You do not access, modify, or delete data belonging to other users beyond what is
strictly necessary to demonstrate the vulnerability.
- You do not degrade the service for other users (no automated scanners, no
denial-of-service, no brute force).
- You do not publicly disclose the vulnerability before we have had a reasonable
opportunity to remediate.
6. Coordinated disclosure
We ask that you give us a reasonable window to investigate and remediate before publicly
disclosing your findings. We aim to fix high-severity vulnerabilities within
90 days of confirmation; less severe issues may take longer. If you intend
to publish your research, please coordinate with us so customers are protected before
disclosure.
7. Rewards
Groomba does not currently operate a paid bug bounty program. With your permission, we will
acknowledge your contribution once a fix is deployed.
8. Contact
Email: hello@groomba.ai
Subject line: "Security report"
Machine-readable index:
/.well-known/security.txt
This policy is effective as of May 12, 2026, and may be updated as our security program
evolves.