Last updated: Oct 23nd, 2025
At 7shifts, the security of our systems and the protection of our customer data is a top priority. We value the crucial role the security research community plays in helping us stay secure. This policy explains how to report vulnerabilities to us, what you can expect from us, and how we can work together to protect our users.
Our Responsible Disclosure Program is facilitated through Inspectiv, a private bug bounty platform.
We have two distinct channels for submitting your findings. Please choose the one that best fits your situation.
This policy applies to any digital assets owned, operated, or maintained by 7shifts. To help you focus your efforts, we have defined what is in and out of scope.
In-Scope Assets
Out-of-Scope Assets & Activities
Excluded Vulnerability Types
We generally do not award bounties for vulnerabilities that have no demonstrable security impact. While we encourage you to report anything you find, the following are examples of issues that are not eligible for a reward through our bug bounty program:
For a complete and detailed list of excluded vulnerability types, please review the full program policy on the Inspectiv platform.
To ensure our program is safe and effective for everyone, we require all researchers to adhere to the following rules:
Security researchers that are participating in our bug bounty program, which is managed by Inspectiv, will be required to agree to Inspectiv’s rules, terms, and conditions. Sign up at https://www.inspectiv.com/researchers.
We consider security research conducted under this policy to be authorized. We will not initiate or support legal action against you for good-faith, accidental violations of this policy, provided you comply with all applicable laws and adhere to the guidelines outlined herein.
Once you submit a report, here’s what you can expect from us:
Monetary bounties are available for valid, in-scope vulnerabilities submitted through our official bug bounty program which is managed by Inspectiv. Payouts are based on the severity of the vulnerability and the criticality of the affected asset.
Note: The “Tiers” below correspond to the criticality of the asset you are testing. A detailed overview of which assets fall into which tier is available on the Inspectiv platform. See https://www.inspectiv.com/researchers.
| Severity | Tier 1 | Tier 2 | Tier 3 |
| Critical | $500 | $1,000 | $2,500 |
| High | $250 | $500 | $1,000 |
| Medium | $100 | $250 | $500 |
| Low | $50 | $100 | $200 |
Severity is determined by Inspectiv’s triage team based on impact and the privileges required to exploit the vulnerability. For more detail on the rating process, please refer to the documentation within the Inspectiv platform.
What information should I include in my report?
Please include a clear description of the vulnerability, steps to reproduce it, potential impact, and any proof-of-concept code or screenshots that demonstrate the issue.
How long will it take to resolve my report?
Our goal is to acknowledge your report within 48 hours. Remediation timelines vary depending on the severity and complexity of the vulnerability, but we aim for resolution within our 180-day public disclosure window.
Can I publicize my findings?
We request that you allow us at least 180 days to remediate the vulnerability before public disclosure.
How long does it take to receive a bounty payment?
Once the issue is validated and resolved, Inspectiv processes payouts according to their standard schedule.