Security & Compliance · Responsible disclosure
Find a vulnerability? Tell us first.
Email security@kumokodo.ai with reproduction details. We acknowledge within 1 business day, triage within 5, and follow a coordinated-disclosure timeline. A formal bug-bounty program activates alongside the SOC 2 Type I auditor engagement; until then, we honor responsible-disclosure reports manually with named acknowledgment in /security release notes (no monetary payout pre-program).
How to report.
- 1. Email security@kumokodo.ai with subject line starting with
[disclosure]. - 2. Include: vulnerability description, reproduction steps, demonstration URL or curl command, what attacker capabilities you demonstrated, your suggested severity classification.
- 3. Use a research account if you can — a free-tier Kodori workspace works. Don’t pivot to other customers’ tenants under any circumstance — that crosses into an actual data-confidentiality incident regardless of your intent.
- 4. If your finding requires producing real customer data to demonstrate, STOP. Email us with the theoretical attack and we’ll set up a controlled reproduction environment with you under safe-harbor terms.
- 5. Optional: PGP-encrypt the report against our public key (available on request). Most reports are fine in plaintext over TLS-protected SMTP.
Scope.
In scope
- kodori.ai (production marketing surface)
- app.kodori.ai (production app surface) — when live; today the product runs at kodori.ai/dashboard via SSO
- api.kodori.ai (REST + MCP endpoints) — once the dedicated subdomain is live; today the routes mount at kodori.ai/api/v1 + kodori.ai/api/mcp
- The TypeScript SDK at @kumokodo/kodori-sdk on npm
- Authentication, session management, OAuth flows (Google + Microsoft + WorkOS SAML)
- Authorization gates (canReadDocument and the deny-wins composition)
- Hash-chained audit log integrity + the verifyAuditChain code path
- External connector data flows (Slack / Gmail / Outlook / SharePoint / OneDrive / Google Drive)
- Cedar policy engine evaluation + the divergence-observation cron
- Webhook signature verification + replay protection
- API key generation + storage + verification
- BYO-KMS envelope encryption flow + DEK re-wrap pipeline
Out of scope
- Vercel / Neon / Cloudflare R2 / Anthropic / OpenAI / Inngest / Resend / Stripe / WorkOS / Slack / Microsoft / Google infrastructure — report directly to those sub-processors
- Best-practice violations without a demonstrable security impact (TLS cipher preferences, security-header configuration nuances)
- DoS / DDoS / volumetric attacks (Cloudflare handles upstream)
- Social-engineering attacks against KumoKodo personnel
- Issues requiring physical access to the user device
- Self-XSS or attacks requiring an already-compromised user account
- Email spoofing of kumokodo.ai outbound (SPF / DKIM / DMARC are configured but inbound spoofing is the recipient's mail provider concern)
- Spamming the report intake address — repeat low-quality reports may be IP-blocked
What happens next.
- Within 1 business day
Acknowledgment of receipt with a tracking ID. Intake reviewer assigned (today: Founder).
- Within 5 business days
Initial triage complete. Severity classified (Sev 1-4 per the Incident Response Policy). Reporter notified of the classification.
- Within 30 days
For Sev 1 / 2: fix shipped + post-incident review documented. For Sev 3 / 4: remediation timeline communicated; fix typically lands within 90 days.
- After fix lands
Reporter notified of the fix + offered named acknowledgment in /security release notes (declinable). For Sev 1 / 2 fixes: the post-mortem is published anonymized 30 days after resolution.
Safe harbor.
KumoKodo will not pursue legal action against researchers who:
- Make a good-faith effort to avoid privacy violations, destruction of data, and degradation of service to other users.
- Stay within the in-scope catalog above.
- Disclose vulnerabilities to security@kumokodo.ai before any public disclosure.
- Allow KumoKodo a reasonable amount of time to remediate (per the timeline above) before public disclosure.
If you’re unsure whether your action is in scope or authorized, ask before acting. Email security@kumokodo.ai with subject line [disclosure-scope] and we’ll respond same-day with a yes / no / boundary clarification.