Security Policy

Responsible disclosure of security vulnerabilities

Reporting Security Vulnerabilities

At Okavango Tech, we take security seriously. If you discover a security vulnerability in our systems, we appreciate your help in disclosing it responsibly.

How to Report

What We Accept

✅ In Scope

  • okavango-tech.com domain
  • Cross-site scripting (XSS)
  • SQL injection
  • Authentication bypasses
  • Data exposure vulnerabilities
  • Server-side security issues

❌ Out of Scope

  • Social engineering attacks
  • Physical security issues
  • DoS/DDoS attacks
  • Spam or phishing
  • Issues requiring user interaction
  • Self-XSS vulnerabilities

Our Response Process

1
Acknowledgment: We'll confirm receipt within 48 hours
2
Investigation: We'll investigate and validate the issue within 5 business days
3
Resolution: We'll work on a fix and keep you updated on progress
4
Disclosure: We'll coordinate disclosure timeline with you

Guidelines

  • Make a good faith effort to avoid privacy violations and data destruction
  • Don't access or modify data that doesn't belong to you
  • Give us reasonable time to respond before any disclosure
  • Don't use automated scanning tools without permission
Note: We're committed to working with security researchers in a spirit of cooperation and mutual respect. Valid reports may be eligible for recognition on our acknowledgments page.

Last updated: August 2025

Okavango
OKAVANGO

Lideramos projetos de implementação de Sistemas de Inteligência Artificial. Somos desenvolvedores de software.

Nossos Compromissos

Seus dados estão seguros. Só os usamos para fornecer o melhor serviço.

Sem letras miúdas. Tudo claro e direto.

Dúvidas? Estamos aqui para ajudar.

Comprometidos com a excelência em cada projeto.