We take the security of our platform seriously. This page explains how to report a vulnerability to Timepath, what we commit to in return, and what this policy does not cover.
Updated on 21st April 2026
If you believe you have found a security issue affecting Timepath, please email security@timepath.co. A valid report must include:
Timepath does not operate a bug bounty program. We do not offer monetary rewards, gifts, swag, or public acknowledgments in exchange for unsolicited vulnerability reports. Submitting a report does not create any entitlement to compensation.
Emails requesting payment, "compensation", "a small token", or threatening public disclosure unless a payment is made will be ignored and may be reported to the relevant email provider's abuse contact and, where applicable, law enforcement.
The following report types are out of scope and will not receive a reply:
security.txt or a specific header is missing, now that this page exists.If you act in good faith, follow this policy, limit your testing to your own account or test data, avoid accessing or modifying other users' data, do not degrade our services, and give us reasonable time to address an issue before public disclosure, we will not pursue legal action against you.
This safe harbor does not extend to extortion, data exfiltration, destructive testing, or disclosure of user data.
We aim to acknowledge valid, in-scope reports within five working days. We do not commit to a fixed triage, patch, or disclosure timeline: security work is prioritised against real user impact. Follow-up "have you fixed it yet?" emails do not accelerate triage.
Our RFC 9116 security.txt file is published at /.well-known/security.txt.
Stay up to date by subscribing to our newsletter