Skip to content

Security: spotbo-inc/spotbo

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

If you discover a security vulnerability in Spotbo, please report it responsibly.

Email: security@spotbo.com

Please do not open a public GitHub issue for security vulnerabilities.

What to include

  • A description of the vulnerability
  • Steps to reproduce (if applicable)
  • The potential impact
  • Any suggested fixes

Response timeline

  • Acknowledgment — within 48 hours
  • Initial assessment — within 7 days
  • Fix target — within 90 days, depending on severity

Scope

The following are in scope:

  • Authentication and authorization bypasses
  • Cross-site scripting (XSS)
  • Server-side request forgery (SSRF)
  • Data exposure or leakage
  • Injection vulnerabilities (SQL, NoSQL, command)
  • Broken access controls
  • Cryptographic weaknesses in the messaging system

The following are out of scope:

  • Rate limiting or brute force without demonstrated impact
  • Vulnerabilities in third-party dependencies (report upstream)
  • Social engineering attacks
  • Denial of service attacks
  • Issues already reported or publicly known
  • Automated scanner output without a demonstrated exploit

Encryption

Direct messages on Spotbo are end-to-end encrypted using the Signal Protocol (X3DH key exchange + Double Ratchet). Messages are encrypted on the sender's device and can only be decrypted by the intended recipient. Spotbo's servers never have access to plaintext message content.

Acknowledgments

We appreciate responsible disclosure and will credit researchers (with permission) once a fix is deployed.

There aren’t any published security advisories