In scope
- kovira.app (marketing site and public surfaces)
- app.kovira.app (the Kovira product)
- Public API endpoints under app.kovira.app
- Supabase edge functions exposed under the kovira.app domain
We welcome reports from security researchers and the wider community. This page sets out what is in scope, our safe harbour position, how to reach us, and the response timelines you can expect.
Email security disclosures to the address below. Please include reproduction steps, the affected URL or endpoint, the impact you observed, and any supporting screenshots or proof-of-concept payloads. If you can keep the writeup self-contained (no external links to drive-by hosting), that helps us triage faster.
PGP encryption is optional. If you would like to send an encrypted report, request our public key in your initial message and we will respond with the current key fingerprint before you send sensitive payloads.
We aim to be predictable. The targets below are commitments we make to anyone who reports an issue in good faith.
Within 5 business days of receipt. You will hear from a human, not an autoresponder.
Within 10 business days. We will share whether the report is accepted, our severity assessment, and a rough remediation timeline.
We will keep you informed through to remediation, and will coordinate a public disclosure date with you if one is appropriate.
These are the surfaces we accept reports against, and the categories we ask researchers not to test.
Kovira will not pursue legal action against researchers who act in good faith and follow this policy. Specifically, if you:
We consider research conducted under this policy to be authorised, lawful, and not in breach of our terms of service. If a third party initiates legal action against you for activity that complies with this policy, we will make it known that the activity was authorised.
We maintain an internal hall of fame for researchers whose reports lead to a fix. With your permission, we will list your name (or handle) once the issue is resolved. Kovira does not currently run a paid bounty programme, so recognition is the thank-you we can offer alongside a prompt fix.
For the broader security posture (tenant isolation, RBAC, MFA, audit, encryption, vault), see the Kovira security overview.