Security & Responsible Disclosure

Version: 1.0 Effective: March 2026 Contact: security@oryniq.com

1. Our Commitment

OrynIQ connects to enterprise ServiceNow environments and handles sensitive organizational data. Security is not an afterthought — it is a core responsibility. We are committed to responding to legitimate vulnerability reports promptly, transparently, and without legal action against researchers acting in good faith.

If you believe you have found a security vulnerability in OrynIQ, we want to hear from you.

2. How to Report

Send vulnerability reports by email. Do not open a public GitHub issue, post on social media, or disclose to a third party before we have had a reasonable opportunity to investigate and respond.

Email: security@oryniq.com

Subject line: [SECURITY] <brief description>

We target an initial acknowledgement within 2 business days and a triage decision within 5 business days.

Report a vulnerability

3. Scope

The following systems and assets are in scope for responsible disclosure:

AssetDescription
app.oryniq.comOrynIQ control plane — authentication, data access, API endpoints
oryniq.comMarketing website
OrynIQ APIAll REST API routes under /api/phaas/

Vulnerability classes of particular interest:

  • Authentication bypass or session fixation
  • Cross-tenant data access (IDOR, broken object-level authorization)
  • ServiceNow credential exposure or exfiltration
  • Injection vulnerabilities (SQL, command, SSRF)
  • Privilege escalation across roles (customer_viewerglobal_admin, etc.)
  • Broken access controls on AI agent write-back actions
  • Sensitive data exposure in API responses or logs

4. Out of Scope

Do not test against production. If you need to verify a finding, contact us first and we will arrange a safe testing environment.

The following are out of scope and will not be accepted as valid reports:

  • Denial of service (DoS/DDoS) attacks of any kind
  • Social engineering or phishing of OrynIQ personnel
  • Physical security attacks
  • Vulnerabilities in third-party services (Cloudflare, Anthropic, Resend) — report these to the respective vendor
  • Automated scanner output without a demonstrated impact
  • Missing security headers with no demonstrated exploitability (e.g., missing HSTS when Cloudflare already enforces it)
  • Rate limiting on non-sensitive endpoints
  • Self-XSS requiring the attacker to be logged in as the victim
  • Bugs requiring physical access to the user's device

5. What to Include in Your Report

A good report helps us reproduce and triage quickly. Please include:

  • Description — what the vulnerability is and what it allows an attacker to do
  • Steps to reproduce — a clear, step-by-step reproduction path
  • Impact — what data or functionality is at risk, and for which users
  • Evidence — screenshots, request/response captures, or a proof-of-concept (PoC); redact any sensitive data before sending
  • Environment — browser, OS, or tool used if relevant
  • Suggested fix — optional but appreciated

6. What to Expect

StageTarget Timeline
Initial acknowledgement2 business days
Triage and severity assessment5 business days
Status update (fix in progress or declined)10 business days
Fix deployed (for confirmed critical/high findings)30 days from confirmation
Coordinated disclosure (if requested)Agreed jointly — typically 90 days

We will keep you informed throughout the process. If we need more time for a complex fix, we will communicate the revised timeline before the agreed disclosure date.

We do not offer a paid bug bounty program at this time. We do publicly acknowledge researchers who responsibly disclose valid findings, with their permission.

7. Safe Harbor

OrynIQ will not pursue civil or criminal action against researchers who:

  • Discover and report vulnerabilities in good faith under this policy
  • Do not access, modify, or destroy data belonging to other customers
  • Do not disrupt platform availability or degrade service for other users
  • Report findings to us before any public disclosure
  • Comply with applicable law throughout their research

If you are uncertain whether a planned test falls within this policy, contact us first and ask. We would rather answer a question in advance than deal with an incident after the fact.

8. Acknowledgements

We recognise researchers who responsibly disclose valid security findings. With your permission, your name or handle will be listed here.

No acknowledgements yet — be the first.

This policy is reviewed and updated as the platform evolves. Version 1.0 — effective March 2026.