Last Updated: October 8, 2025Version: 1.0
At mysamantha.ai, we are committed to the security and safety of our users and systems. This Vulnerability Disclosure Program (VDP) describes how security researchers and ethical hackers may responsibly report vulnerabilities they discover in our systems, and how we will respond.
We aim to foster collaboration and trust, and to ensure vulnerabilities are addressed in a safe, structured manner.
The following assets are within the scope of this VDP:
The following are explicitly out of scope:
If you believe something technically out of scope is related (e.g., third-party plugin vulnerability exploited via us), please reach out to us and we will evaluate case-by-case basis.
To help maintain safety, the following rules apply to all testing:
To submit a vulnerability, please follow these steps:
Send a report to samantha@zemuria.com
Field | Description |
---|---|
Summary / Title | Brief title of the issue |
Affected asset(s) | Domain, API endpoint, parameter, etc. |
Severity & impact | What is the harm (e.g. data leak, privilege escalation) |
Steps to reproduce / PoC | Clear, reproducible steps or proof-of-concept code |
Observed behavior & expected | What you saw vs. what should happen |
Suggested mitigation | (optional) Your thoughts on a fix or a workaround |
Attachments/logs/screenshots | If helpful |
Timestamp/environment | Browser, OS, API version, etc. |
Upon receiving your report, we will send an acknowledgement within 1-2 business days. (We reserve the right to filter, validate, and request more information.)
We greatly appreciate responsible security reporting. Researchers who submit valid, good-faith reports may receive exclusive mysamantha.ai merchandise as a token of appreciation for their valuable contributions.
Malicious or reckless behaviour, however, may result in legal or administrative action. Please ensure your testing follows the rules outlined in this policy to stay within safe harbor.
We commit to the following internal SLAs (subject to change as our program evolves):
Where reasonable, we may request extensions or coordinate with you on timelines. For certain severe vulnerabilities, we may issue interim mitigations or workarounds.
If we cannot fix within the target window, we will communicate status and next steps.
After the issue is resolved (or at our discretion), we may publish a vulnerability advisory describing the issue, root cause, and mitigation. With your permission, we may credit you (name or alias) as the reporter in such advisories.
If you do not wish to be credited, please indicate in your report.
We request that you do not publicly disclose the vulnerability until after the fix is live, or as mutually agreed.
This policy does not provide authority to perform testing on systems outside our control. All other legal rights and remedies remain unaffected.
We reserve the right to refuse or disregard reports that are frivolous, duplicate, out of scope, or that involve prohibited activities.
We may revise this policy from time to time. The "Last Updated" date above reflects the current version.
For any questions about this policy or your report, contact: samantha@zemuria.com