Loading...
Loading...
This site uses cookies for authentication and language preferences. No tracking or advertising cookies are used. You can choose to reject all cookies β the site will still work, but language preferences won't persist across visits. Learn more
Responsible disclosure policy, incident response runbook, and advisories
Turing Verify processes sensitive document data. We welcome reports of security vulnerabilities from researchers, customers, and the public. This page is the canonical reference for our disclosure process, breach notification procedure, and published advisories. It complements our Privacy Policy and Trust & Sub-Processors page.
Please report suspected vulnerabilities to [email protected]. Use our PGP key on request. When reporting, include:
Safe harbor
Good-faith research carried out in accordance with this policy will not be pursued legally. Do not access, modify, or exfiltrate data beyond what is strictly necessary to prove a finding. Do not degrade service availability, and never target other users' data or accounts.
We do not currently operate a paid bug-bounty, but we acknowledge valid reports on this page and in release notes where appropriate.
If we discover a personal data breach that is likely to result in a risk to data subjects' rights and freedoms, the following runbook executes:
No advisories have been published at this time. Advisories will appear here as issues are discovered, resolved, and disclosed. The absence of entries reflects current disclosure state and is not a statement that no security work has been performed.
Detailed controls are published on our Trust & Sub-Processors page (EU data residency, encryption at rest and in transit, least-privilege access, scoped service tokens, dependency scanning, signed deploys, and private service mesh).