SECURITY FIRST

Security at CheckSec

We take security seriously at every level of our platform, from secure coding practices to infrastructure protection.

OUR APPROACH

How We Approach Security

Security is embedded in everything we do, from development to deployment and beyond.

Secure Coding Practices

We ensure that secure coding practices are at the front of all our development work. Our team follows industry best practices including OWASP guidelines, secure code reviews, and regular security training.

Dependency Vulnerability Management

We take dependency vulnerability management seriously. Our automated systems continuously monitor and update dependencies, ensuring we're protected against known vulnerabilities and emerging threats.

Secure Technology Stack

We select the technologies that are part of our tech stack based on security aspects. Every component is evaluated for its security track record, active maintenance, and alignment with our security requirements.

VULNERABILITY DISCLOSURE

Reporting Security Issues

We Take Security Reports Seriously

At CheckSec, we take all security reports seriously. We appreciate the security research community's efforts in helping us maintain the highest security standards for our platform and our customers.

If you've discovered a security vulnerability or have concerns about our security practices, please don't hesitate to reach out to us.

Report via Email

Send your security disclosures to:

security@checksec.com

Report via Support

Submit through our support portal:

support.checksec.com

Working with Security Researchers

We're happy to work with security researchers to get issues fixed. While we don't have a formal bug bounty program yet, we will occasionally pay out bounties for significant findings at our discretion.

When reporting a vulnerability, please include:

  • A detailed description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact and severity assessment
  • Any proof-of-concept code (if applicable)

View our CVE details and security history:

CVE Details for CheckSec Canopy

Ready to transform your penetration testing workflow?

Join 200+ security teams already using CheckSec to streamline their entire penetration testing process.