Security & Vulnerability Disclosure

Last updated: April 7, 2026

Isorun's product is isolation. Security is not a feature for us — it is the product. We take vulnerability reports seriously and we want to make it easy and safe for researchers to tell us when something is wrong.

Reporting a Vulnerability

If you believe you have found a security vulnerability in any Isorun service, please report it to us:

Please include enough detail for us to reproduce the issue: a description of the vulnerability, the steps to reproduce it, the impact you believe it has, and any proof-of-concept code or screenshots. Reports written in English are easiest for us to triage, but we accept reports in any language.

Please do not publicly disclose the vulnerability before we have had a reasonable opportunity to investigate and remediate. See our coordinated disclosure timeline below.

Scope

The following Isorun-operated assets are in scope for this policy:

Out of Scope

The following are explicitly out of scope:

If you are unsure whether something is in scope, please ask before testing.

Safe Harbor

Isorun will not initiate legal action against, or support legal action by third parties against, security researchers who:

  1. make a good-faith effort to comply with this policy and our Acceptable Use Policy;
  2. report findings to security@isorun.ai before any public disclosure and allow us at least 90 days to remediate (or such longer period as is reasonable for the severity of the issue);
  3. do not access, modify, exfiltrate, or delete data belonging to other users beyond the minimum necessary to demonstrate the vulnerability;
  4. do not degrade availability of the Services for other users — no DoS, no resource exhaustion, no destructive testing;
  5. limit testing to accounts and sandboxes you control, or to test environments we explicitly provide for the purpose;
  6. do not violate applicable law in the course of their research; and
  7. act in good faith and without intent to harm Isorun, its customers, or any third party.

If you comply with these conditions, your activity is authorised by Isorun. We will not pursue civil or criminal claims against you for the research itself, and we will work in good faith to defend you if a third party attempts to do so on the basis of your authorised research. This safe harbor does not extend to research that violates the conditions above, and it does not waive the rights of any third party.

If at any point during your research you have a question about whether a particular action is within scope or covered by safe harbor, email us at security@isorun.ai and we will respond promptly.

Our Commitment to You

When you submit a vulnerability report, we commit to:

Coordinated Disclosure

We follow coordinated vulnerability disclosure. The default timeline is 90 days from initial report to public disclosure, extendable by mutual agreement for issues that require complex remediation. We will publish an advisory at isorun.ai/security/advisories after remediation, and we will request a CVE for any vulnerability that warrants one.

If active exploitation is observed in the wild, or if a vulnerability is independently disclosed by a third party, we may shorten the disclosure timeline to protect users.

Bug Bounty

Isorun does not currently operate a paid bug bounty program. We acknowledge researchers in our Hall of Fame below and provide swag for impactful reports. We will introduce a paid program once we have the volume to do so responsibly.

Hall of Fame

Researchers who have responsibly disclosed vulnerabilities to Isorun. Send us a name and a link, and we will add you here after the issue is remediated.

No reports yet — be the first.

Questions

For questions about this policy or about Isorun's security program generally, email security@isorun.ai. For commercial security inquiries (pen-test reports, SOC 2 status, vendor questionnaires), email hello@isorun.ai.