Security Disclosure Policy
Effective Date: August 4, 2025
Our Commitment to Security
At NuraCove, we take the security of our AI-powered women's wellness platform extremely seriously. We understand that our users trust us with sensitive health and personal information, and we are committed to maintaining the highest security standards to protect this data.
Responsible Disclosure Program
We welcome and encourage security researchers, ethical hackers, and the cybersecurity community to help us identify and address potential security vulnerabilities in our systems. We believe that working together makes our platform safer for all midlife women who depend on our services.
Scope
This security disclosure policy applies to all NuraCove systems and services, including:
- Our main website and web applications (nuracove.com and subdomains)
- Mobile applications (iOS and Android)
- AI-powered wellness recommendation systems
- User data storage and processing systems
- Payment processing systems
- Third-party integrations and APIs
What We're Looking For
We're particularly interested in reports about:
High Priority Vulnerabilities:
- SQL injection, XSS, and other injection attacks
- Authentication and authorization bypasses
- Remote code execution vulnerabilities
- Data exposure or privacy breaches
- Privilege escalation vulnerabilities
- Cryptographic issues
Medium Priority Issues:
- Cross-Site Request Forgery (CSRF)
- Information disclosure
- Business logic flaws
- Session management issues
- Input validation problems
AI/ML Specific Concerns:
- Model poisoning or adversarial attacks
- Prompt injection in AI systems
- Bias or discrimination in AI recommendations
- Data leakage from AI models
How to Report a Security Vulnerability
Contact Information
Email: security@nuracove.com
Subject: "Security Vulnerability Report"
For Urgent/Critical Issues:
Email: urgent-security@nuracove.com
Subject: "URGENT - Critical Security Issue"
Required Information
Please include the following in your report:
- Vulnerability Description: Clear description of the security issue
- Affected Systems: Which parts of our platform are affected
- Steps to Reproduce: Detailed steps to reproduce the vulnerability
- Proof of Concept: Screenshots, videos, or code demonstrating the issue
- Impact Assessment: Your assessment of the potential impact
- Suggested Fix: Any recommendations for addressing the issue
- Your Contact Information: How we can reach you for follow-up
Our Response Process
Acknowledgment (Within 24 Hours)
- We will acknowledge receipt of your report
- Assign a unique tracking number
- Provide initial assessment of severity
- Establish communication timeline
Investigation (1-7 Days)
- Our security team will investigate and validate the report
- We may request additional information or clarification
- We'll provide regular updates on our progress
- We'll assess the risk and prioritize remediation efforts
Resolution
- Critical Issues: Immediate action within 24-48 hours
- High Priority: Fix within 7 days
- Medium Priority: Fix within 30 days
- Low Priority: Fix within 90 days
Safe Harbor
We commit to the following safe harbor provisions for security researchers who:
- Follow this responsible disclosure policy
- Act in good faith
- Do not violate privacy or destroy data
- Do not perform actions that could harm our users
We Will Not Pursue Legal Action For:
- Good faith security research conducted under this policy
- Accessing account information that belongs to the researcher
- Activities conducted to identify security vulnerabilities
- Public disclosure after we've had reasonable time to address the issue
What We Ask of You
Guidelines for Responsible Research:
- Don't access or modify user data: Only access your own accounts
- Don't perform destructive actions: Avoid actions that could harm our systems or users
- Don't spam or overload systems: Use rate limiting and be respectful of our resources
- Don't share vulnerabilities publicly: Give us time to fix issues before disclosure
- Don't violate privacy: Respect user privacy and confidentiality
Out of Scope
The following are generally out of scope for our security program:
- Social engineering attacks against our employees
- Physical attacks against our offices or data centers
- Denial of service attacks
- Spam or content injection
- Issues requiring physical access to user devices
- Vulnerabilities in third-party services we don't control
- Issues that require user interaction or social engineering
Recognition and Rewards
Acknowledgment
We believe in recognizing the valuable contributions of security researchers:
- Public acknowledgment on our security page (with your permission)
- Certificate of appreciation for significant contributions
- Invitation to beta test new security features
Reward Program (Coming Soon)
We are developing a bug bounty program with monetary rewards for qualifying vulnerabilities. Details will be announced on this page when available.
Security Measures We've Implemented
To give researchers context about our existing security measures:
- End-to-end encryption for sensitive health data
- Multi-factor authentication for all accounts
- Regular security audits and penetration testing
- Secure coding practices and code reviews
- Real-time monitoring and incident response capabilities
- Regular employee security training
- Compliance with healthcare data protection regulations
Updates to This Policy
We may update this security disclosure policy from time to time. Changes will be posted on this page with an updated effective date.
Questions
If you have questions about this policy or our security practices:
Email: security@nuracove.com
Subject: "Security Policy Question"
For General Inquiries:
Email: support@nuracove.com