We take security seriously. If you've found a vulnerability in Docually, please report it responsibly so we can fix it quickly.
If you believe you've found a security vulnerability in Docually — whether it affects our static site, Cloudflare Worker API, or third-party integrations — please do not open a public GitHub issue. Instead, contact us privately.
Send your report to our security team. We aim to acknowledge all reports within 48 hours.
security@docually.comAlternatively, use the Contact page and select "Security disclosure" as the inquiry type.
• Description of the vulnerability and its potential impact
• Step-by-step reproduction instructions
• Affected URL, endpoint, or component
• Any supporting evidence (screenshots, proof-of-concept, logs)
The following assets are in scope for responsible disclosure:
| Asset | Status | Notes |
|---|---|---|
| docually.com (Pages static site) | In scope | All HTML pages and public-facing frontend |
| Cloudflare Worker API endpoints | In scope | Auth, contact form, future edge-mode tools |
| Authentication flow (GitHub SSO, email/password) | In scope | Phase 2 — when live |
| Client-side tool processing (pdf-lib, Tesseract.js) | In scope | Local-mode security, data leakage |
| Third-party CDN scripts (unpkg, cdnjs) | Out of scope | Report to the CDN/library maintainers |
| Cloudflare infrastructure itself | Out of scope | Report via HackerOne → Cloudflare |
| Social engineering / phishing | Out of scope | Not a product vulnerability |
For sensitive reports, you may encrypt your email using our PGP public key. Key publishing is planned for Phase 2 — in the meantime, contact us via the secure form on the Contact page using the "Security disclosure" inquiry type, which routes to a monitored private channel.
Please do not publicly disclose details of a vulnerability before we have had a reasonable opportunity to fix it. We commit to acting promptly and keeping you informed throughout the process.
Researchers who follow these guidelines will not face legal action from Docually in connection with their research, and we will treat your report in good faith.
We maintain a security acknowledgements page for researchers who responsibly disclose valid vulnerabilities. If you would like to be credited publicly, please let us know in your report.
Currently: No reports received yet — be the first.
This policy was last updated: 2026-02-22. Questions about this policy? Contact us.