Vulnerability Disclosure Philosophy Security of user data and communication is of utmost importance to ClickUp. In pursuit of the best possible security for our service, we welcome responsible disclosure of any vulnerability you find in ClickUp.
ClickUp accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers, and consultants. ClickUp defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability or confidentiality of our products and services.
This policy applies to any digital assets owned, operated, or maintained by ClickUp, including public facing websites. We are interested in vulnerabilities with the ClickUp Platform and ClickUp customer data. We are interested in vulnerabilities with sub-domains which serve ClickUp Platform functionality.
Trust. We maintain trust and confidentiality in our professional exchanges with security researchers. Respect. We treat all researchers with respect and recognize your contribution for keeping our customers safe and secure. Transparency. We will work with you to validate and remediate reported vulnerabilities in accordance with our commitment to security and privacy. Common Good. We investigate and remediate issues in a manner consistent with protecting the safety and security of those potentially affected by a reported vulnerability.
ClickUp recommends that security researchers share the details of any suspected vulnerabilities across any asset owned, controlled, or operated by ClickUp (or that would reasonably impact the security of ClickUp and our users) using the web form below. The ClickUp Security team will acknowledge receipt of each vulnerability report, conduct a thorough investigation, and then take appropriate action for resolution.
When conducting vulnerability research according to this policy, we consider this research to be:
Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy;
Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls;
Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
Lawful, helpful to the overall security of the Internet, and conducted in good faith.
You are expected, as always, to comply with all applicable laws.
If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please inquire via HackerOne Support team before going any further.