Responsible Disclosure Policy
How to report security vulnerabilities to SECUVA
Last updated: April 2026
We welcome security researchers and the broader community to help us maintain the security of our platform. SECUVA was built by cyber security practitioners — we take vulnerability reports seriously, respond quickly, and credit researchers who follow responsible disclosure. If you discover a security vulnerability, please follow the process below.
For questions about our general security architecture and data protection practices, see our Security & Trust page or the Security Policy.
How to Report
Send your report directly to our security team:
What to Include
- Description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Screenshots or proof-of-concept code if applicable
- Your contact information for follow-up questions
Scope
In Scope
- secuva.com.au and all subdomains
- SECUVA agent — on-prem binary, update mechanism, signature verification
- Control plane API — authentication, authorisation, input validation
- Web console — session management, RBAC enforcement
- Agent ↔ control plane mTLS — pinning bypass, downgrade attacks
- Audit log — integrity, tamper detection, chain validation
- Any component or flow that could expose patient data
Out of Scope
- Social engineering or phishing attacks against SECUVA staff
- Physical access to infrastructure or hardware
- Denial of service or volumetric resource exhaustion
- Third-party services not operated by SECUVA
- Findings in customer-operated on-prem environments
- Vulnerabilities already reported and under active remediation
Researcher Guidelines
- Make good faith efforts to avoid privacy violations and service disruption
- Do not access or modify other users' data
- Report vulnerabilities as soon as possible after discovery
- Allow us reasonable time to remediate before public disclosure
- Do not perform testing that could harm our users or services
Our Response
- Acknowledgment within 24 hours
- Initial triage and severity assessment within 72 hours
- Regular progress updates until resolution
- Public credit for responsible disclosure (if desired)
We do not pursue legal action against researchers who follow these guidelines in good faith. SECUVA practises responsible disclosure itself and holds our own vendors to the same standard.
Ready to report a vulnerability?
Email us directly. We respond within 24 hours.
security@secuva.com.au