Responsible Disclosure
We value the security research community and appreciate your help in keeping TigerAccess secure.
Safe Harbor
We will not pursue legal action against researchers acting in good faith.
Fast Response
We acknowledge reports within 24 hours and provide regular updates.
Bug Bounty
Rewards up to $10,000 for critical vulnerabilities.
Guidelines
- Do not access or modify data that does not belong to you
- Do not perform actions that could harm our services or users
- Do not publicly disclose vulnerabilities before we have addressed them
- Provide sufficient detail to reproduce the vulnerability
- Give us reasonable time to fix the issue before disclosure
In Scope
- TigerAccess web application (*.tigeraccess.io)
- TigerAccess API endpoints
- TigerAccess CLI and desktop applications
- TigerAccess open source projects
Out of Scope
- —Social engineering attacks
- —Physical security attacks
- —Denial of service attacks
- —Third-party services and applications
Ready to Secure Your Infrastructure?
Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.
No credit card required • 14-day free trial • Enterprise support available