Security

We take the security of our products and our users seriously. If you believe you have found a security vulnerability in any Tirnara product or website, we want to hear from you.

How to report

Email security@tirnara.com with:

  • A clear description of the vulnerability.
  • Steps to reproduce it (or a proof-of-concept).
  • The product, URL, version, or component affected.
  • Any potential impact you have observed or expect.
  • How you would like to be credited if a fix is published (or that you prefer to remain anonymous).

Response expectations

We aim to:

  • Acknowledge your report within 5 business days.
  • Provide an initial assessment within 10 business days.
  • Keep you informed as we investigate and remediate.
  • Credit you in any public advisory, if you wish.

Scope

The following are in scope:

  • tirnara.com and any subdomain owned by Tirnara LLC.
  • Tirnara-published mobile and desktop applications.

The following are out of scope:

  • Findings from automated scanners that have not been validated.
  • Reports based solely on missing best-practice headers without a demonstrated impact.
  • Social engineering, physical attacks, or denial-of-service tests.
  • Issues in third-party services we use (please report those to the third party).

Safe harbor

If you make a good-faith effort to comply with this policy when researching and reporting a vulnerability, we will not initiate or pursue legal action against you for your research. We ask that you:

  • Avoid privacy violations, destruction of data, and interruption or degradation of our services.
  • Only interact with accounts you own or with explicit permission of the account holder.
  • Give us a reasonable amount of time to investigate and remediate before disclosing publicly.

security.txt

A machine-readable version of this policy is published at /.well-known/security.txt per RFC 9116.