Elevate your online payments stack with the Stitch payment gateway, built for enterprise scale
Responsible Disclosure Policy
Updated:
January 23, 2026
- Introduction
- Stitch is committed to maintaining the highest standards of security and protecting the data entrusted to us. We welcome responsible security research that helps us identify weaknesses, provided it is done safely, privately and in line with this policy.
- This policy outlines how to report potential vulnerabilities and the rules for conducting security testing against Stitch’s systems.
- If you believe you’ve discovered a potential security vulnerability within any Stitch’s system, we encourage you to let us know right away. We will work with you to address the issue promptly and responsibly.
- Purpose
The purpose of this policy is to:- provide a safe and authorised channel for reporting potential security vulnerabilities;
- set clear expectations and boundaries for researchers;
- protect Stitch, our customers and the broader financial ecosystem from harm; and
- ensure all testing is conducted safely and non-destructively.
- provide a safe and authorised channel for reporting potential security vulnerabilities;
- Scope
- This policy applies only to testing that is non-destructive, non-intrusive and strictly within the permitted in-scope areas listed below.
- This policy applies to:
- Stitch’s public-facing applications, application programming interfaces (“APIs”), software development kit (“SDKs”) and developer documentation;
- Stitch’s dashboards, authentication systems and management interfaces;
- Stitch-owned domains and subdomains; and
- Stitch-managed infrastructure or systems that process customer or financial data.
- Stitch’s public-facing applications, application programming interfaces (“APIs”), software development kit (“SDKs”) and developer documentation;
- If a researcher believes a vulnerability may require intrusive, destructive or high-risk testing to confirm, they must stop immediately and submit the information they have already gathered. Stitch will then either:
- provide written, explicit permission for additional testing with strict rules; or
- perform the intrusive testing internally.
- Researchers must not attempt to escalate the attack or validate a destructive vector themselves.
- How to Report a Vulnerability
- All submissions must be sent to: security@stitch.money.
- Please do not contact individual employees, executives, LinkedIn profiles or personal email addresses. This causes unnecessary disruption and will not accelerate the process.
- Your report must include:
- a clear description of the suspected vulnerability;
- steps taken to identify or demonstrate it (required for reproducibility);
- safe, non-destructive proof-of-concept (screenshots, URLs, sanitised logs, example payloads);
- the impact as you understand it (why it matters);
- the environment tested (your own account only, where applicable); and
- any suggestions for remediation (optional).
- Incomplete submissions that do not include reproduction steps may be rejected.
- Stitch will acknowledge your submission at our earliest convenience, but we cannot commit to a strict timeline for response.
- Stitch will not provide follow-up updates on fix status. Once we acknowledge and thank you for the submission, that concludes the interaction.
- Safe Harbour & Legal Position
- We support good-faith security research aligned with this policy.
- If you follow this policy:
- we will not pursue legal action for your testing;
- we will not pursue law enforcement investigations;
- your testing will be considered "research" that benefits security improvements at Stitch; and
- your actions will be considered authorised for the purposes of cybersecurity and anti-hacking laws.
- However, if you do not follow this policy, especially if your actions:
- risk sensitive, customer, financial or employee data;
- impact financial systems;
- cause downtime or harm; or
- involve prohibited or destructive methods,
Stitch reserves the right to take legal action, including in cases having an operational, reputational or financial impact.
- No Bug Bounty / No Rewards
- Stitch does not operate a bug bounty program.
- We do not provide monetary rewards, gifts, incentives or compensation of any kind.
- Researchers insisting on rewards or attempting to pressure Stitch into payment will not be engaged.
- We may, in the future, provide Certificates of Appreciation, for compliant, high-quality reports.
- Responsible Researcher Expectations
- Required Conduct:
Researchers must:- perform testing only within the scope of this policy;
- perform testing only on systems owned and operated by Stitch
- use only their own accounts for testing;
- ensure testing is non-destructive and non-intrusive;
- immediately stop and report if a finding appears to require destructive testing;
- provide full, accurate reproduction steps; and
- keep all information strictly confidential.
- Prohibited Conduct:
Researchers must not:- publish or share vulnerability details anywhere (including on social media, forums or blogs) regardless of whether Stitch fixes the issue;
- access, modify or exfiltrate sensitive, customer, financial or employee data;
- move, alter or steal funds;
- contact individual employees or executives directly;
- run destructive, intrusive or harmful tests; or
- insist on rewards or compensation,
- Violations may result in legal action.
- Required Conduct:
- In-Scope Research Areas (Permitted Non-Destructive Testing Only)
Researchers may submit non-destructive proof-of-concept testing limited to the following:- Domains
- *.stitch.money; and
- other Stitch-owned domains (a formal list can be provided on request),
- Core Web Applications & APIs
- public-facing web services;
- REST APIs and GraphQL endpoints; and
- public developer documentation services,
- Authentication & Authorisation
- login, signup, multi-factor authentication (“MFA”), password reset;
- Open Authorisation / OpenID or OpenID Connect flows;
- session and identity management; and
- testing using your own account only,
- Privilege Escalation & Business Logic
- unauthorised access to features within your own account;
- workflow bypasses; and
- improper enforcement of roles or permissions,
- Server- and Client-side Vulnerabilities, including but not limited to:
- OWASP Top 10 issues (CSRF, IDOR, SSRF, SQLi, XSS, etc.);
- security misconfigurations; and
- broken access controls,
- Public-facing Infrastructure
- public APIs;
- web servers;
- public domain name system (“DNS”);
- cloud storage buckets; and
- admin portals only if intended for your own account,
- Network Discovery
- basic TCP port scanning only; and
- no high-volume, aggressive or intrusive scanning,
- Customer Communication Channels
- email, SMS templates or communication workflows; and
- non-intrusive tests only,
- Domains
- Out-of-Scope (Strictly Prohibited) Activities
The following activities are strictly prohibited:- User & Data Security:
- accessing or exploiting real user accounts or data;
- downloading, exfiltrating, modifying or publishing personal or financial data; or
- attempting account takeover of any user other than yourself,
- Financial Systems & Funds Movement
- moving, reversing or manipulating money or transactions; or
- interacting with production financial flows in any way,
- High-Risk / Destructive Activities
- actions that may cause financial, operational or reputational harm;
- defacing systems;
- attempting to access payment or cardholder data (primary account numbers (“PANs”), card verification values (“CVVs”), Payment Card Industry (“PCI”) environments);
- interfering with fraud detection, anti-money laundering (AML) systems, custody infrastructure, wallets or key material; or
- attempting to extract private keys, certificates or hardware security module (“HSM”) secrets,
- Network/Service Disruption
- denial-of-service attacks;
- flooding, fuzzing or aggressive scanning; or
- excessive automated testing that degrades service or affects customers,
- Authentication Attacks
- brute forcing or credential stuffing;
- password spraying; or
- automated login attempts against any user other than your own,
- Social Engineering
- phishing employees;
- impersonation of Stitch staff, customers or partners; or
- pretexting or tricking support channels,
- Third Parties & Supply Chain
- testing banks, processors, payment partners or integrations; or
- targeting services not owned by Stitch,
- Regulatory & Market Integrity
- bypassing compliance controls; or
- manipulating pricing feeds, foreign exchange rates or settlement cut-offs,
- Remote Code Execution
- if you suspect RCE, do not attempt to obtain it; and
- report the suspicion immediately with a safe, minimal proof of concept.
- User & Data Security:
- Disclosure & Confidentiality Requirements
- All information shared with Stitch must be kept private.
- Researchers may not publish:
- vulnerability details;
- screenshots or logs;
- blog posts or social media content; or
- academic papers or presentations,
whether or not Stitch has remediated the issue.
- Any form of public disclosure is strictly prohibited without prior, explicit written permission from Stitch.
- Recognition & Future Considerations
- While Stitch does not offer financial rewards:
- we may issue Certificates of Appreciation for high-quality, compliant reports; or
- we may provide a formal “verification of contribution” for academic programs requiring proof.
- Reports that do not adhere to this policy may be rejected.
- While Stitch does not offer financial rewards:
- Legal
- This policy is intended to support security research and provides safe harbour for good-faith actions.
- However:
- this policy does not grant authorisation to access data that is not your own;
- this is not an agreement to provide any form of compensation or bounty; and
- Stitch may update this policy at any time.
- Closing
- We appreciate your commitment to responsible security research and for helping us protect our ecosystem.
- To report a vulnerability, email: security@stitch.money.
- Please follow this policy carefully to ensure a safe, effective and legally protected process.
