Last-updated: 2025-04-17-2025
Amazing.com Inc.—including the Amazing.com and Zoof.com / Amazing Intelligence platforms—values the security of our customers, partners, and data. We welcome responsible security research and appreciate the community’s help in keeping our systems safe.
If you believe you have identified a vulnerability in one of our assets, please report it as described below. We currently do not pay monetary bounties, but we are happy to acknowledge valid contributions.
In-Scope |
Out-of-Scope |
---|---|
|
|
Unsure if something is in scope? Ask us first at security@amazing.com.
If you work in good faith and follow this policy, Amazing.com Inc. will extend safe-harbor protection: we will not pursue legal action or refer you to law enforcement for research performed within these guidelines.
Please avoid attaching live malware, running automated scanners that generate excessive traffic, or publicly disclosing the issue before we confirm remediation.
Stage |
Target SLA* |
---|---|
Acknowledgement |
≤ 3 business days |
Triage / analysis |
≤ 5 business days |
Remediation plan |
≤ 30 days for critical, ≤ 90 days maximum |
Co-ordinated disclosure |
We will work with you post-fix |
* Timelines follow CISA VDP and DOJ best-practice guidance.
We keep you informed throughout—and, If you would like a written acknowledgement for a valid report, let us know and we’ll be happy to provide one privately.
Amazing.com Inc. does not operate a paid bug-bounty program. By submitting a report you acknowledge:
Provided you:
Amazing.com Inc. will not take legal action under the CFAA, DMCA, or similar laws. Should a third-party initiate legal action, we will inform them that your activities were authorized under this VDP.
A machine-readable reference to this policy lives at: amazing.com/security.txt