About
Security policy
Coordinated vulnerability disclosure, our response SLAs, and what we publish.
Reporting a vulnerability
Email security@getviewport.com. PGP key on request.
What to include:
- Description of the vulnerability.
- Reproduction steps (URL or code snippets).
- Impact assessment.
- Your contact info and whether you'd like public credit.
What to expect:
- Acknowledgement within 24 hours during business days (US Eastern).
- Initial assessment and severity within 5 business days.
- Patch plan within 10 business days for critical, 30 days for high, 90 days for medium / low.
- Public disclosure coordinated with you. Default 90 days; we'll request extensions if needed and agree on a timeline.
We do not currently run a bug bounty. We pay for critical / high-severity reports on a case-by-case basis and always with explicit credit if you want it.
Scope
In scope:
getviewport.com,app.getviewport.com,api.getviewport.com,relay.getviewport.com.- The
@viewportai/daemonnpm package. - The
ghcr.io/viewportai/relayDocker image. - Public mobile app (when shipped).
Out of scope:
- Third-party services (WorkOS, Resend, Stripe). Report directly to them.
- Social engineering of Viewport staff.
- Physical security of Viewport offices.
- DDoS or volumetric attacks.
What we publish
- Security advisories: published at github.com/viewportai/viewport/security/advisories. Subscribe to releases for alerts.
- CVE assignments: for upstream packages we maintain or fork.
- Postmortems: for any security incident with customer impact. Within 14 days of resolution.
What we don't publish
- Active investigations.
- Reports we received with a
private/embargoedflag. - Penetration test reports (available under NDA to enterprise customers).
Customer-facing security artifacts
For enterprise customers:
- Latest SOC 2 Type I report (available now, NDA).
- SOC 2 Type II report (in audit window, expected Q4).
- ISO 27001 attestation (planned).
- Penetration test reports (annual; available under NDA).
- DPA / data processing terms.
Email security@getviewport.com to request.
Operational security
- MFA enforced on all Viewport-staff accounts.
- Production access is gated through change management and audited.
- Encryption at rest for the platform database (AES-256, AWS KMS).
- Encryption in transit for everything that crosses the public internet.
- Backups encrypted, geo-replicated, retention per data-processing terms.
- Vendor reviews for any third-party processor that touches customer data.
Threat model (high level)
- We design against a compromised platform staff member with database read access. The mitigation is: context vault content is ciphertext-only, session transcripts are not persisted.
- We design against a compromised relay node. The mitigation is: encrypted payloads, no persistence.
- We design against compromised customer credentials. The mitigation is: per-binding crypto identity, audit log, fast revocation.
We do not (yet) design against:
- A nation-state adversary with control of the customer's local machine + the network path.
- A compromised hardware supply chain.
See Concepts: Trust and privacy for the implementation detail.
Contact
- General security:
security@getviewport.com. - Sales / compliance questions:
hello@getviewport.com. - Press:
press@getviewport.com.