OrynIQ connects to enterprise ServiceNow environments and handles sensitive organizational data. Security is not an afterthought — it is a core responsibility. We are committed to responding to legitimate vulnerability reports promptly, transparently, and without legal action against researchers acting in good faith.
If you believe you have found a security vulnerability in OrynIQ, we want to hear from you.
Send vulnerability reports by email. Do not open a public GitHub issue, post on social media, or disclose to a third party before we have had a reasonable opportunity to investigate and respond.
Email: security@oryniq.com
Subject line: [SECURITY] <brief description>
We target an initial acknowledgement within 2 business days and a triage decision within 5 business days.
The following systems and assets are in scope for responsible disclosure:
| Asset | Description |
|---|---|
app.oryniq.com | OrynIQ control plane — authentication, data access, API endpoints |
oryniq.com | Marketing website |
| OrynIQ API | All REST API routes under /api/phaas/ |
Vulnerability classes of particular interest:
customer_viewer → global_admin, etc.)The following are out of scope and will not be accepted as valid reports:
A good report helps us reproduce and triage quickly. Please include:
| Stage | Target Timeline |
|---|---|
| Initial acknowledgement | 2 business days |
| Triage and severity assessment | 5 business days |
| Status update (fix in progress or declined) | 10 business days |
| Fix deployed (for confirmed critical/high findings) | 30 days from confirmation |
| Coordinated disclosure (if requested) | Agreed jointly — typically 90 days |
We will keep you informed throughout the process. If we need more time for a complex fix, we will communicate the revised timeline before the agreed disclosure date.
OrynIQ will not pursue civil or criminal action against researchers who:
If you are uncertain whether a planned test falls within this policy, contact us first and ask. We would rather answer a question in advance than deal with an incident after the fact.
We recognise researchers who responsibly disclose valid security findings. With your permission, your name or handle will be listed here.
No acknowledgements yet — be the first.
This policy is reviewed and updated as the platform evolves. Version 1.0 — effective March 2026.