At Tech Integrators, we take security seriously and are committed to protecting our systems, products, and users. We appreciate the responsible disclosure of security vulnerabilities that may impact our services. If you have discovered a potential security issue, please report it to us by following the guidelines below.

Reporting Guidelines

Do not publicly disclose the vulnerability before we have had the opportunity to investigate and address it.

Provide a detailed report including:

A clear description of the vulnerability
Steps to reproduce the issue (including any PoC code, if applicable)
The potential impact of the vulnerability
Your contact details for follow-up (optional)
Do not exploit the vulnerability beyond what is necessary to demonstrate its existence.
Do not access, modify, or delete any data that does not belong to you.

How to Report ?

To report a vulnerability, please email us at security@tech-integrators.com with the subject line “Security Vulnerability Report”.

What to Expect ?

We will acknowledge receipt of your report within 48 hours.
Our security team will investigate and validate the issue.
If the vulnerability is confirmed, we will work on a fix and notify you when it is resolved.
We may publicly acknowledge your contribution if you wish, subject to our discretion.

Scope

Our vulnerability disclosure program covers:
Web applications and APIs developed by Tech Integrators
Mobile applications developed by Tech Integrators
Tech Integrators’ infrastructure and systems

Out of Scope

Social engineering attacks (phishing, impersonation, etc.)
Denial-of-service (DoS) attacks
Physical security vulnerabilities
Reports lacking sufficient information or impact

We sincerely appreciate your efforts to improve our security. Thank you for helping Tech Integrators stay secure!

Tech Integrators Security Team