Legal

Responsible Disclosure

Found a security vulnerability? We want to hear from you. This page describes how to report issues and what you can expect from us.

Last updated: 1 April 2026

01Our commitment

Security is fundamental to what Opsion does. We monitor on-chain activity for teams and businesses that rely on us to keep their assets and operations safe. If you have discovered a security vulnerability in our platform, we want to hear from you. We commit to working with you to understand and resolve the issue quickly, and we will not take legal action against researchers who act in good faith under this policy.

02Scope

This policy applies to the following systems:

  • console.opsion.xyz — the main web application
  • api.opsion.xyz — the REST API
  • opsion.xyz — the marketing website
  • docs.opsion.xyz — the documentation site

Any other Opsion-owned domain or service that handles user data or authentication is also in scope. Third-party services we use (Stripe, Resend, etc.) are out of scope — please report those issues directly to the respective vendor.

03How to report

Email your findings to team@opsion.xyz. Please include:

  • A clear description of the vulnerability and its potential impact.
  • The affected URL, endpoint, or component.
  • Step-by-step reproduction instructions.
  • Any proof-of-concept code, screenshots, or HTTP request/response samples.
  • Your preferred contact method for follow-up questions.

You may encrypt your report using our PGP key, available on request at the email above.

04What to expect from us

MilestoneTarget time
Acknowledgement of your report24 hours
Initial triage and severity assessment3 business days
Status update on remediation7 business days
Resolution of critical issues14 days
Resolution of other issues90 days

We will keep you informed throughout the process and notify you when the issue has been resolved. With your permission, we will acknowledge your contribution in our release notes.

05Ground rules

We ask that you:

  • Give us reasonable time to investigate and fix the issue before any public disclosure.
  • Avoid accessing, modifying, or deleting data that does not belong to you.
  • Do not perform denial-of-service attacks, spam, or social engineering against our team or users.
  • Do not use automated scanners that generate excessive traffic without prior agreement.
  • Act in good faith — the goal is to protect users, not to cause harm.

Researchers who follow these rules will not face legal action from Opsion related to their security research. We will not pursue claims under the Computer Fraud and Abuse Act or equivalent legislation for good-faith research conducted under this policy.

06Bug bounty

We do not currently operate a formal paid bug bounty programme. However, we deeply appreciate the work of security researchers and will acknowledge meaningful contributions publicly (with your consent) and may offer rewards at our discretion for critical findings. If you are interested in a coordinated disclosure arrangement, mention this in your initial report.

07Out of scope

The following are outside the scope of this policy:

  • Vulnerabilities in third-party services or libraries we depend on (report those upstream).
  • Missing security headers that do not lead to a demonstrable exploit.
  • Self-XSS or issues that require physical access to a victim's device.
  • Rate limiting on non-sensitive endpoints.
  • Reports generated entirely by automated scanners without manual validation.
  • Theoretical attacks without a working proof-of-concept.

Questions about this document? team@opsion.xyz