Security & Vulnerability Disclosure
Effective date: September 15, 2025
Avaplicity, Inc. ("Avaplicity") is committed to protecting the security, integrity, and availability of our website and iOS app (the "Services"). This page describes our security posture at a high level and how to responsibly disclose security issues to us.
Scope
In scope
- •Public web properties under
avaplicity.com
(e.g.,www.avaplicity.com
). - •Public API and agent endpoints served by Avaplicity (e.g.,
api.avaplicity.com
,agent.avaplicity.com
). - •The Avaplicity iOS app (current App Store version and latest TestFlight build, if provided to you).
Out of scope
- •Third-party platforms and providers (e.g., AWS, OpenAI, Anthropic, Cartesia, Apple, Google/Firebase, RevenueCat, PostHog, Datadog, LaunchDarkly, Vercel). Report issues to those vendors directly unless the issue stems from our configuration.
- •Denial-of-service, volumetric testing, or traffic floods.
- •Automated scanning that generates excessive traffic or alerts.
- •Social engineering, phishing, physical security testing.
- •Clickjacking on non-sensitive pages, missing low-risk headers, or version banners without proven exploitability.
Our triage & remediation process
- •Acknowledgement: We aim to acknowledge your report within 3 business days.
- •Triage: We assess severity, scope, and exploitability; we may request additional details or a safe, minimal PoC.
- •
Fix & verification: We prioritize remediation by impact:
- Critical: target fix or mitigation within 7–14 business days
- High: within 30 days
- Medium: within 90 days
- Low: within 120 days
Timelines may vary for complex dependencies; we will keep you informed.
- •Coordinated disclosure: After remediation, we can coordinate a public disclosure. We do not operate a paid bug bounty at this time but may offer a public thank-you (with your permission).
Incident response & notification
We maintain runbooks for detection, escalation, containment, and recovery. In the event of an incident that impacts user data, we will notify affected users and regulators as required by applicable law.
Additional hardening measures
- •CI/CD & supply chain: OIDC-based GitHub Actions, image signing/verification (planned), multi-stage container builds, dependency scanning, and environment-specific secrets.
- •Environment isolation: Separate namespaces and accounts for dev/staging/production; tight ingress/egress controls.
- •Monitoring & SLOs: Datadog SLO dashboards, kill-switch monitors, custom metrics (StatsD) and alerts.
- •Backup & recovery: Managed backups for primary data stores; periodic restore tests.
- •Least privilege & auditing: IAM roles scoped per service; CloudTrail auditing; periodic key rotation and review.
Legal
This page forms part of our Terms of Use, Privacy Policy, and Acceptable Use Policy. Your use of the Services remains subject to those terms. Nothing here grants permission to access data you do not own or to disrupt the Services.
Changes
We may update this page as our security program evolves. The date at the top reflects the latest version.
Company
Avaplicity, Inc.
7775 Walton Parkway, Suite 100
New Albany, Ohio 43054
Email: privacy@avaplicity.com