RevOps is committed to the security of our systems and our customer data
We appreciate and encourage security researchers to contact us to report potential vulnerabilities identified in any product, system, or asset directly managed by RevOps. If you believe you have identified a potential security vulnerability, please share it with us by following the submission guidelines below. We agree to review any submissions in a timely manner and appreciate researchers assisting us in our security efforts.
*Please note, RevOps does not operate a public bug bounty program and we cannot offer reward or compensation in exchange for submitting issues at this time.
Researchers shall disclose potential vulnerabilities in accordance with the following guidelines:
Once a report is submitted, RevOps commits to provide prompt acknowledgement of receipt of all reports (within two business days of submission) and will keep you reasonably informed of the status of any validated vulnerability that you report through this program.
Certain vulnerabilities are considered out of scope for our Responsible Disclosure Program. Out-of-scope vulnerabilities include:
Once a report is submitted, RevOps commits to providing prompt acknowledgement of receipt (within two business days of submission). After a report has been acknowledged and confirmed, we will keep you reasonably informed of its status.
When reporting a potential vulnerability, please include a detailed summary of the vulnerability, including the target, steps, tools, and artifacts used during discovery (screen captures welcome).
Our SOC-2 Type 1 report certifies that the data handled and managed by RevOps is classified in accordance with the highest standards