Intixus Technologies welcomes reports from security researchers who identify potential vulnerabilities in our products, websites, or infrastructure. We are committed to addressing valid reports promptly and collaborating in good faith.
How to Report
Please send vulnerability reports to:
Include a clear description of the vulnerability, steps to reproduce, and any proof-of-concept or screenshots that would help us understand and verify the issue. We will acknowledge receipt and work with you to resolve it.
Safe Harbour
We will not pursue legal action against researchers who:
- Make a good-faith effort to avoid privacy violations and data destruction
- Do not exploit, modify, or exfiltrate data beyond what is necessary to demonstrate the vulnerability
- Report vulnerabilities responsibly and allow us reasonable time to address them before public disclosure
We expect researchers to comply with applicable laws. Activities that disrupt services, harm users, or access data without authorisation may fall outside this policy.
What We Ask You Not to Do
- Do not exploit the vulnerability beyond what is needed to demonstrate it
- Do not modify, delete, or exfiltrate data
- Do not perform social engineering or physical attacks against our staff or facilities
- Do not disclose the vulnerability publicly before we have had time to address it
Our Commitment
We will:
- Acknowledge your report within a reasonable timeframe
- Provide updates on our progress
- Notify you when the vulnerability has been addressed, where appropriate
For general security information, see our Security & Trust page.