Vulnerability Disclosure Policy

At Feather, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present.

If you discover a vulnerability, we would like to know about it so we can take steps to address it as quickly as possible. We would like to ask you to help us better protect our clients and our systems.

We agree not to pursue legal action against individuals or companies who submit vulnerability reports through our requested channel and who comply with the requirements of this policy unless we are compelled to do so by a regulatory authority, other third party, or applicable laws.

Important Notes:

  • Do not submit automated or scanner-generated reports. Please refrain from submitting reports based solely on automated tools or commonly known issues that do not demonstrate a feasible attack. These types of submissions often are duplicates of existing reports and will not be prioritized by the team.
  • We do not have an active bug bounty program. Feather does not currently offer financial rewards for vulnerability disclosures. We reserve the right to do so in the future, and if you believe that you've found a serious issue that you can demonstrate, please still reach out.

In order to submit your finding, please do the following:

  • E-mail your findings to security@feather-insurance.com
  • Do not submit your findings via Intercom or any other public channel.
  • Do not take advantage of the vulnerability or problem you have discovered, for example by downloading more data than necessary to demonstrate the vulnerability or deleting or modifying other people's data.
  • Do not reveal the problem to others until it has been resolved.
  • Do not use attacks on physical security, social engineering, distributed denial of service, spam or applications of third parties.
  • Do provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible.

What you can expect from us:

  • A timely response to your email (within a week).
  • An open dialogue to discuss the issue.
  • Notification when the vulnerability analysis has completed each stage of our review.
  • A public acknowledgement regarding your findings after the issue has been resolved.

We strive to resolve all problems as quickly as possible, and we would like to play an active role in the ultimate publication on the problem after it is resolved.