Skip to main content

Report Security Vulnerability

How to submit a vulnerability report to Level, including scope guidelines and what to include.

Updated today

Introduction

Level runs quarterly penetration tests and actively monitors for vulnerabilities, but real-world use surfaces things automated testing misses. If you find a security issue, we want to hear about it.

Send reports to [email protected].

ℹ️ NOTE: If you're creating a test account specifically for vulnerability research, add "Tester" to your email address (e.g., [email protected]) so we can filter those accounts from our metrics.


Report Security Vulnerability

What to Include in Your Report

A useful report gets addressed faster. Include:

  • A clear, step-by-step description of how to reproduce the vulnerability

  • The specific asset affected (see Assets in Scope below)

  • An attack scenario demonstrating the potential impact

  • Screenshots, video, or proof-of-concept code if applicable

Reports without reproduction steps and an impact scenario can't be acted on.


Assets in Scope


In-Scope Issues

We want reports on:

  • Authentication and session management — sign-in flows, session handling, OAuth, account recovery, password policies

  • Access control — permission bypasses, CSRF, unauthorized access between accounts

  • Injection vulnerabilities — SQL injection, XSS, and other input-based attacks

  • Cross-customer device access — any path that lets one customer access another customer's managed devices

  • Account-level vulnerabilities — malware upload, phishing URL embedding, RTLO/IDN homograph attacks from untrusted users on the same account

Testing must be done on your own Level accounts. If you need a sandbox environment, contact us before testing.


Out-of-Scope Issues

These won't be accepted. Don't submit reports for:

Behavior we've assessed and accepted:

  • Rate limiting

  • Best-practice concerns without evidence of an exploitable vulnerability

  • Sessions not invalidating when 2FA is enabled

  • Vulnerabilities only affecting users on outdated, unpatched browsers

  • Race conditions with no security impact

  • CSRF on actions with no security impact (login, logout, unauthenticated pages)

  • Theoretical risks without a demonstrated attack path

  • Output from automated scanners without explanation

Infrastructure / configuration noise:

  • Email spoofing / SPF / DKIM / DMARC policies

  • Hyperlink injection in emails

  • Missing security headers unless tied to a specific vulnerability

  • SSL/TLS cipher issues without a working proof of concept

  • Banner grabbing and software version disclosure

  • Open ports without a demonstrated vulnerability

  • DNSSEC / DANE

  • HSTS or CSP headers

  • Disclosure of known public files (e.g., robots.txt)

  • Username or email enumeration

  • Autocomplete attributes on web forms

Operational issues:

  • Denial of service against other customers' accounts

  • Social engineering of any kind against other customers or Level staff

  • Spearphishing attempts or contacting support as part of testing

  • Physical intrusion

  • Automated scanning, mail bombing, spam, brute-forcing, or automated attacks (e.g., Burp Intruder)

  • Leaking, manipulating, or destroying user data

Specific DoS exclusions:

  • DoS via malformed inputs or crafted file uploads triggering 500 errors

  • DoS via unlimited or very large password inputs

  • DoS via lack of pagination or large amounts of user-generated content slowing responses


Disqualifiers

Reports are disqualified if they:

  • Lack step-by-step reproduction instructions

  • Involve accessing other customers' accounts

  • Involve social engineering Level staff or customers

  • Use automated attack tools against Level infrastructure

  • Result in leaking, modifying, or destroying user data


FAQ

  • Where do I send vulnerability reports? Email [email protected] with full reproduction steps and an impact scenario.

  • Do you have a bug bounty program? No, we don't have a bug bounty program. Contact [email protected] with questions.

  • Can I test against other customers' accounts? No. Testing must be done on your own Level accounts. Accessing other customers' accounts is an immediate disqualifier and may have legal consequences. Contact us if you need a sandbox environment.

  • My report includes output from an automated scanner. Will that work? Only if it's accompanied by a clear explanation of the vulnerability, reproduction steps, and an attack scenario. Raw scanner output alone won't be acted on.

  • How quickly will you respond? Response times aren't guaranteed. Contact [email protected] directly if you have an urgent disclosure.

Did this answer your question?