NuraCove Policy Pages

Security Disclosure Policy

Effective Date: August 4, 2025

Our Commitment to Security

At NuraCove, we take the security of our AI-powered women's wellness platform extremely seriously. We understand that our users trust us with sensitive health and personal information, and we are committed to maintaining the highest security standards to protect this data.

Responsible Disclosure Program

We welcome and encourage security researchers, ethical hackers, and the cybersecurity community to help us identify and address potential security vulnerabilities in our systems. We believe that working together makes our platform safer for all midlife women who depend on our services.

Scope

This security disclosure policy applies to all NuraCove systems and services, including:

  • Our main website and web applications (nuracove.com and subdomains)
  • Mobile applications (iOS and Android)
  • AI-powered wellness recommendation systems
  • User data storage and processing systems
  • Payment processing systems
  • Third-party integrations and APIs

What We're Looking For

We're particularly interested in reports about:

High Priority Vulnerabilities:

  • SQL injection, XSS, and other injection attacks
  • Authentication and authorization bypasses
  • Remote code execution vulnerabilities
  • Data exposure or privacy breaches
  • Privilege escalation vulnerabilities
  • Cryptographic issues

Medium Priority Issues:

  • Cross-Site Request Forgery (CSRF)
  • Information disclosure
  • Business logic flaws
  • Session management issues
  • Input validation problems

AI/ML Specific Concerns:

  • Model poisoning or adversarial attacks
  • Prompt injection in AI systems
  • Bias or discrimination in AI recommendations
  • Data leakage from AI models

How to Report a Security Vulnerability

Contact Information

Primary Contact:
Email: security@nuracove.com
Subject: "Security Vulnerability Report"
For Urgent/Critical Issues:
Email: urgent-security@nuracove.com
Subject: "URGENT - Critical Security Issue"

Required Information

Please include the following in your report:

  • Vulnerability Description: Clear description of the security issue
  • Affected Systems: Which parts of our platform are affected
  • Steps to Reproduce: Detailed steps to reproduce the vulnerability
  • Proof of Concept: Screenshots, videos, or code demonstrating the issue
  • Impact Assessment: Your assessment of the potential impact
  • Suggested Fix: Any recommendations for addressing the issue
  • Your Contact Information: How we can reach you for follow-up

Our Response Process

Acknowledgment (Within 24 Hours)

  • We will acknowledge receipt of your report
  • Assign a unique tracking number
  • Provide initial assessment of severity
  • Establish communication timeline

Investigation (1-7 Days)

  • Our security team will investigate and validate the report
  • We may request additional information or clarification
  • We'll provide regular updates on our progress
  • We'll assess the risk and prioritize remediation efforts

Resolution

  • Critical Issues: Immediate action within 24-48 hours
  • High Priority: Fix within 7 days
  • Medium Priority: Fix within 30 days
  • Low Priority: Fix within 90 days

Safe Harbor

We commit to the following safe harbor provisions for security researchers who:

  • Follow this responsible disclosure policy
  • Act in good faith
  • Do not violate privacy or destroy data
  • Do not perform actions that could harm our users

We Will Not Pursue Legal Action For:

  • Good faith security research conducted under this policy
  • Accessing account information that belongs to the researcher
  • Activities conducted to identify security vulnerabilities
  • Public disclosure after we've had reasonable time to address the issue

What We Ask of You

Guidelines for Responsible Research:

  • Don't access or modify user data: Only access your own accounts
  • Don't perform destructive actions: Avoid actions that could harm our systems or users
  • Don't spam or overload systems: Use rate limiting and be respectful of our resources
  • Don't share vulnerabilities publicly: Give us time to fix issues before disclosure
  • Don't violate privacy: Respect user privacy and confidentiality

Out of Scope

The following are generally out of scope for our security program:

  • Social engineering attacks against our employees
  • Physical attacks against our offices or data centers
  • Denial of service attacks
  • Spam or content injection
  • Issues requiring physical access to user devices
  • Vulnerabilities in third-party services we don't control
  • Issues that require user interaction or social engineering

Recognition and Rewards

Acknowledgment

We believe in recognizing the valuable contributions of security researchers:

  • Public acknowledgment on our security page (with your permission)
  • Certificate of appreciation for significant contributions
  • Invitation to beta test new security features

Reward Program (Coming Soon)

We are developing a bug bounty program with monetary rewards for qualifying vulnerabilities. Details will be announced on this page when available.

Security Measures We've Implemented

To give researchers context about our existing security measures:

  • End-to-end encryption for sensitive health data
  • Multi-factor authentication for all accounts
  • Regular security audits and penetration testing
  • Secure coding practices and code reviews
  • Real-time monitoring and incident response capabilities
  • Regular employee security training
  • Compliance with healthcare data protection regulations

Updates to This Policy

We may update this security disclosure policy from time to time. Changes will be posted on this page with an updated effective date.

Questions

If you have questions about this policy or our security practices:

Email: security@nuracove.com
Subject: "Security Policy Question"

For General Inquiries:
Email: support@nuracove.com

Thank you for helping us keep NuraCove and our community of midlife women safe and secure!