10Trust · Security

Responsible disclosure

Last updated: 2026-04-25 · Pre-launch

Found a security issue in Jubi? We'd rather hear it from you than read about it. This page is what's in scope, how to send it to us, and what we'll do for researchers acting in good faith.

Pre-launch. A formal vulnerability research programme with hall-of-fame and (where permitted) recognition rewards is on the roadmap. Today, we accept reports under the policy below. Send to security@jubi.my.

How to report

Email security@jubi.my. Include:

A signed PGP key for encrypted reports is on the roadmap. Until then, please redact any customer data in your report and refer to records by an opaque identifier.

Scope

The following are in scope:

The following are out of scope:

Safe harbour

If you research in good faith and within this policy, Jubi will:

Good-faith research means: minimum data access necessary to demonstrate the issue; no exfiltration of customer data; no destruction or modification of data; no disruption of service; reasonable rate limits on testing traffic; immediate stop and report if you encounter unexpected access to customer data.
Out of scope behaviours forfeit safe harbour and may result in account suspension and, where appropriate, referral to law enforcement: data exfiltration beyond what's necessary to demonstrate the issue; deliberate denial-of-service; pivoting to other systems; targeting other customers' tenants; demanding payment or threatening publication as leverage; or any action that would be illegal under applicable law independent of this policy.

Safe harbour does not extend to anyone subject to U.S. or other applicable sanctions, or located in a jurisdiction sanctioned by the Government of Malaysia or our payment processors.

Coordinated disclosure

Recognition

For valid reports of new, in-scope vulnerabilities we will, with your consent, acknowledge you in our security acknowledgements (planned for GA). Where local law permits and we are otherwise able, we may extend a recognition reward; this is at our sole discretion and is not a contractual entitlement.

We do not currently operate a paid bug bounty programme. If we launch one, the terms (eligibility, payout schedule, exclusions) will be published separately.

What we ask researchers to avoid

Customer-side red teaming

Customers may, under their engagement, conduct authorised security testing of their own tenant. This is not a vulnerability programme; it is a contracted activity. Email security@jubi.my in advance with the planned scope, window, and source IP ranges so we can avoid blocking legitimate test traffic and so the activity is correctly attributed in our logs.

Reservations

Jubi reserves the right to update or withdraw this policy, modify scope, decline to triage reports outside scope, decline recognition, and take any action it considers appropriate to protect its customers, its platform, and other researchers. Nothing in this policy creates a binding contractual obligation; the safe-harbour commitments above are extended as a matter of programme conduct.

Reports: security@jubi.my · Machine-readable contact: security.txt