Responsible Disclosure

We value the security research community and appreciate your help in keeping TigerAccess secure.

Safe Harbor

We will not pursue legal action against researchers acting in good faith.

Fast Response

We acknowledge reports within 24 hours and provide regular updates.

Bug Bounty

Rewards up to $10,000 for critical vulnerabilities.

Guidelines

  • Do not access or modify data that does not belong to you
  • Do not perform actions that could harm our services or users
  • Do not publicly disclose vulnerabilities before we have addressed them
  • Provide sufficient detail to reproduce the vulnerability
  • Give us reasonable time to fix the issue before disclosure

In Scope

  • TigerAccess web application (*.tigeraccess.io)
  • TigerAccess API endpoints
  • TigerAccess CLI and desktop applications
  • TigerAccess open source projects

Out of Scope

  • Social engineering attacks
  • Physical security attacks
  • Denial of service attacks
  • Third-party services and applications

Report a Vulnerability

Send your report to our security team.

[email protected]

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available