Bug Bounty Program | MSPBots

Start Your AI Ticket App Trial Today

Try our AI-powered triage, ticket QA, sentiment analysis. Fill out the form and start instantly with 3,000 free credits!

Image

MSPbots Bug Bounty Program

1. Purpose

MSPbots operates a multi-tenant platform that processes operational and client-related data. The purpose of this Bug Bounty Program is to identify and remediate security vulnerabilities that could impact:

  • Confidentiality of client or tenant data
  • Authorization boundaries between users, roles, and tenants

We invite qualified security researchers to responsibly disclose vulnerabilities in accordance with this policy.

2. Authorization & Safe Harbor

Security testing conducted in good faith, within the scope defined below, is considered authorized by MSPbots.

If you:

  • Follow this policy
  • Avoid privacy violations and service disruption
  • Do not access or retain real customer data beyond minimal proof

MSPbots will:

  • Not pursue legal action
  • Not initiate law enforcement contact
  • Treat your findings as confidential security research

This safe harbor does not apply to actions outside scope, malicious activity, or violations of applicable law.

3. In-Scope Assets

3.1 Applications & Services

The following MSPbots-owned assets are in scope unless otherwise stated:

  • Web application (app.mspbots.ai)
  • Authentication and authorization flows (app.mspbots.ai)
  • Multi-tenant isolation mechanisms (app.mspbots.ai)
3.2 Environments
  • Production environment only
  • Testing must be performed using accounts and tenants owned by the researcher

4. In-Scope Vulnerability Classes

The program prioritizes vulnerabilities that could lead to unauthorized data access or cross-tenant impact, including but not limited to:

4.1 Authentication & Authorization
  • Broken access control (IDOR, missing authorization checks)
  • Privilege escalation
  • Role or permission bypass
  • Session fixation or hijacking
4.2 Multi-Tenant Isolation (High Priority)
  • Cross-tenant data exposure
  • Tenant boundary bypass

Any vulnerability that demonstrates access to data outside the reporter’s tenant is automatically classified as High or Critical severity.

4.3 Data Exposure
  • Unauthorized access client metadata
  • Excessive data returned by APIs
  • Sensitive data exposure via logs, errors, or exports
  • Insecure object or file access
4.4 Integrations & Agents

Missing request authentication or signing

5. Out-of-Scope

The following activities and findings are not eligible for rewards:

  • Denial of Service (DoS/DDoS), load testing, or traffic flooding
  • Automated scanning that degrades platform stability
  • Social engineering, phishing, or employee targeting
  • Physical security attacks
  • Vulnerabilities in third-party services unless directly exploitable through MSPbots
  • Self-XSS or issues requiring user cooperation
  • Missing headers or best-practice findings without demonstrable security impact
  • Attacks requiring malware, root access, or compromised client systems

6. Rules of Engagement

Permitted
  • Testing only against accounts and tenants you control
  • Manual or low-impact testing techniques
  • Minimal data access required to prove impact
  • Redacted screenshots or partial payloads as proof
Prohibited
  • Accessing or exfiltrating real customer data
  • Mass data extraction or scraping
  • Persistence mechanisms or backdoors
  • Service disruption
  • Sharing findings prior to remediation and approval

Researchers must immediately stop testing once unauthorized data access is confirmed.

7. Severity Classification

Severity is determined based on data sensitivity, exploitability, and scope of impact.

SeverityDescription
CriticalCross-tenant data access, auth bypass leading to unrestricted data exposure.
HighUnauthorized access to sensitive client data or privileged functionality.
MediumLimited data exposure or logic flaws with constrained impact
LowMinor information disclosure without direct data or security impact

8. Rewards

Rewards are determined by:

  • Severity classification
  • Quality and clarity of the report
  • Reproducibility and exploit reliability
  • Novelty of the finding

Duplicate reports are rewarded only for the first valid submission.

9. Reporting Requirements

All submissions must be submitted to support@mspbots.ai and include:

  • Affected asset or feature
  • Account role and tenant context used
  • Step-by-step reproduction instructions
  • Description of data or security impact
  • Screenshots or Proof of Concept videos
  • Any relevant logs or response samples

Incomplete reports may be delayed or closed.

10. Response & Disclosure Process

  • Initial acknowledgment: within 3-5 business days
  • Validation and triage based on severity
  • Remediation timelines depend on risk and complexity
  • Public disclosure requires written approval from MSPbots

We strongly support coordinated disclosure.

11. Compliance Alignment

This Bug Bounty Program supports MSPbots’ compliance and security posture, including:

  • SOC 2 (Vulnerability Management & Monitoring)
  • GDPR Article 32 (Security of Processing)
  • ISO 27001 Secure Development and Operations controls

12. Policy Updates

MSPbots reserves the right to update this policy at any time. Material changes will be communicated via this page or the designated reporting channel.

Ready to Automate Your MSP Operations?

Unlock real-time insights and automation bots that transform how MSPs work.

Enterprise-grade everything

Out-of-the-box security with privacy-secured AI.

SOC 2 TYPE II CERTIFIED

GDPR COMPLIANCE

HIPAA

PCI COMPLIANCE

ADVANCE FIREWALL PROTECTION

2FA SECURITY

MSPbots © 2025, All rights reserved.