| Version | Supported |
|---|---|
| 2.x.x | ✅ |
| < 2.0 | ❌ |
We take the security of Owlette seriously. If you believe you have found a security vulnerability, please report it to us responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please send an email to: security@owlette.app
Include the following information in your report:
- Type of vulnerability (e.g., XSS, SQL injection, authentication bypass)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment: We will acknowledge receipt of your report within 48 hours.
- Communication: We will keep you informed of our progress toward resolving the issue.
- Timeline: We aim to resolve critical vulnerabilities within 7 days, and other issues within 30 days.
- Credit: We will credit you in our release notes (unless you prefer to remain anonymous).
We consider security research conducted in accordance with this policy to be:
- Authorized concerning any applicable anti-hacking laws
- Authorized concerning any relevant anti-circumvention laws
- Exempt from restrictions in our Terms of Service that would interfere with conducting security research
We will not pursue civil action or initiate a complaint to law enforcement for accidental, good-faith violations of this policy.
The following are in scope for security research:
- Owlette web application (owlette.app)
- Owlette Windows agent
- API endpoints
- Authentication and authorization mechanisms
- Data storage and encryption
The following are out of scope:
- Denial of service attacks
- Social engineering attacks
- Physical attacks against our infrastructure
- Attacks against third-party services we use (Firebase, etc.)
- Enable two-factor authentication (2FA) on your account
- Use a strong, unique password
- Keep your backup codes in a secure location
- Review connected machines regularly
- Only install the Owlette agent on machines you own or have authorization to manage
- Keep the agent updated to the latest version
- Protect the machine where the agent is installed with standard security practices
- Revoke machine tokens immediately if a machine is compromised
- Never share your API tokens
- Rotate tokens periodically
- Use the minimum required permissions
- Revoke tokens that are no longer needed
Owlette implements the following security measures:
- Encryption in Transit: All communications use TLS/HTTPS
- Encryption at Rest: Sensitive data is encrypted using AES-256
- Two-Factor Authentication: TOTP-based 2FA with backup codes
- Token Security: Short-lived access tokens with encrypted refresh tokens
- Rate Limiting: API endpoints are rate-limited to prevent abuse
- Audit Logging: Security-relevant actions are logged
For general security questions (not vulnerability reports), contact: support@owlette.app
For vulnerability reports: security@owlette.app