At BidMachine Inc., the confidentiality, integrity, privacy, and availability of our systems and the data we process are fundamental to our business and to the trust our partners place in us.
We recognize the value of independent security research and encourage responsible reporting of vulnerabilities. This policy establishes a clear framework for identifying, reporting, and addressing potential security vulnerabilities in our products, services, or infrastructure.
Our commitment is to:
This policy applies to all BidMachine-owned systems, services, APIs, and applications operating under the bidmachine.io domain and any associated subdomains or environments under BidMachine’s operational control.
Vulnerabilities related to partner or third-party platforms integrated with BidMachine should be reported directly to those providers.
Researchers, partners, or users who identify a potential vulnerability are encouraged to report it responsibly and confidentially to the BidMachine Security Team.
Report submission:
[email protected]
Your report should include:
Researchers are expected to act in good faith and comply with the following:
Researchers following these principles will be protected under BidMachine’s Good Faith Safe Harbor (see Section 8).
Upon receipt of a valid report, BidMachine will:
Where appropriate, BidMachine may publish post-remediation acknowledgments or summaries of resolved vulnerabilities to promote transparency and trust
This policy is managed by the Compliance & Security Function, which coordinates with:
Incident response and vulnerability management activities are aligned with BidMachine’s overarching Information Security Policy and SOC 2 Type II control framework.
BidMachine currently operates a non-monetary disclosure program.
We do not offer financial rewards or bounties for reported vulnerabilities but may, at our discretion, acknowledge researchers who contribute responsibly to improving our security posture.
BidMachine will not initiate legal action against individuals who:
We reserve the right to take appropriate legal action in cases of intentional exploitation, misuse, or actions that cause actual harm to users, systems, or data.
This policy is reviewed annually by the Compliance & Security Function to ensure alignment with evolving security standards, legal requirements, and industry best practices (including ISO/IEC 29147 and ISO/IEC 30111).
All vulnerability reports and related correspondence should be directed to:
[email protected]
For general privacy or compliance inquiries, please contact:[email protected]