Vulnerability Disclosure Policy
KonaSense is committed to protecting our customers and the broader security community. We welcome good faith security research and responsible disclosure of vulnerabilities affecting KonaSense products and services.
## Scope
In scope:
- >KonaSense web applications and dashboards operated by KonaSense
- >KonaSense browser extension and related client components
- >KonaSense APIs and backend services
- >KonaSense hosted infrastructure that is owned and operated by KonaSense
Out of scope:
- >Third party services, integrations, or customer managed environments not operated by KonaSense
- >Denial of Service testing, including any stress testing that impacts availability
- >Social engineering, phishing, or attempts to compromise employees, contractors, or customers
## How to report a vulnerability
Please email your report to: security@konasense.com
Include:
- >A clear description of the issue and security impact
- >Steps to reproduce, including proof of concept details when possible
- >Affected product, endpoint, version, or configuration
- >Any supporting logs, screenshots, or minimal exploit payloads
- >Your contact information and preferred attribution name (optional)
CRITICAL SECURITY REPORT
## What you can expect from us
- >Acknowledge receipt within 2 business days
- >Provide an initial triage update within 5 business days
- >Work with you on validation and remediation
- >Notify you when the issue is fixed or mitigated, when feasible
Fix timelines vary based on severity and complexity, but critical issues are prioritized immediately.
## Safe harbor for good faith research
We will not pursue legal action or request law enforcement involvement against researchers who:
- >Make a good faith effort to avoid privacy violations, data destruction, and service disruption
- >Only access data necessary to demonstrate the vulnerability
- >Do not use the vulnerability to compromise or harm users or systems
- >Report the issue promptly and do not publicly disclose before a fix is available
- >Comply with all applicable laws and this policy
This safe harbor does not apply to:
- >Extortion attempts, ransomware behavior, or threats
- >Intentional data exfiltration beyond what is required to prove the issue
- >Unauthorized persistence, lateral movement, or privilege escalation beyond proof
- >Any activity designed to degrade service availability
## Automated scanning and testing rules
Automated scanning is not allowed on KonaSense systems.
That includes Burp active scans, Nikto, DirBuster, mass fuzzing, vulnerability scanners, and any high volume automation that can create noise or impact performance.
$ Keep the Burp scan button and the Nikto cannon holstered.
$ We like reports, not traffic spikes.
If you need broader testing to confirm impact, email us first and we can coordinate a safe window and a scoped target.
## Guidelines for testing
Please do:
- >Use test accounts you own or are authorized to use
- >Keep requests low volume and avoid repetitive automation
- >Stop testing once you have enough information to demonstrate the issue
- >Coordinate with us if you believe testing could affect real users
Please do not:
- >Run DoS or load tests
- >Attempt to access or modify other users' data
- >Perform automated scanning or intrusive fuzzing
- >Perform physical attacks or target employees or vendors
## Coordinated disclosure
We support coordinated disclosure. If you intend to publish, please allow us a reasonable window to remediate and coordinate details. We are happy to credit researchers in release notes or a public acknowledgements section, if desired.
## Bounty
KonaSense may offer discretionary rewards for high impact findings. Rewards are not guaranteed and are based on severity, quality of the report, and whether the issue is previously known or already being addressed.
## Privacy and data handling
Please avoid sending sensitive personal data in reports. If sensitive data is necessary to demonstrate impact, share minimal samples and redact when possible. We will handle reports as confidential and will use the information solely for triage and remediation.
## Contact
$ Security reports: security@konasense.com
$ General inquiries: hello@konasense.com
Last updated: February 24, 2026
