Responsible disclosure
How to report a security vulnerability to Teleperson.
We take security reports seriously. If you've found a vulnerability in the Teleperson browser extension, web app, or backend, please let us know.
How to report
Email security@teleperson.com. Please include:
- A clear description of the vulnerability.
- Reproduction steps (or a proof-of-concept payload).
- The affected surface (extension version, web app URL, etc.).
- Your assessment of severity and impact.
We aim to acknowledge every report within one business day and provide a substantive response within five business days.
What's in scope
- The published Chrome Web Store and Firefox Add-ons listings.
teleperson.comand any subdomain we control (docs.teleperson.com,*.supabase.coprojects we operate).- The
austinjh1234/teleperson2026GitHub repo (if you find a leaked secret in the history, please tell us privately rather than opening a public issue).
What's out of scope
- Side-loaded development builds. If you're running an unpublished version of the extension you compiled yourself, vulnerabilities specific to that version aren't in scope.
- Third-party integrations. If you find a vulnerability in Anthropic, Stripe, Plaid, ElevenLabs, Vapi, Twilio, or any other vendor we use, please report it to them directly.
- Theoretical attacks that require physical access to the user's unlocked machine.
- DoS attacks, brute-force attacks, or social-engineering tests against our team.
Safe harbor
We will not pursue legal action against good-faith security researchers who:
- Make a reasonable effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
- Do not access more data than necessary to demonstrate the vulnerability.
- Give us reasonable time to fix the issue before public disclosure.
If you have any uncertainty about whether your testing is in scope or appropriate, ask first at security@teleperson.com.
Credit
With your permission, we credit reporters in our release notes and on this page. Reporters who find significant vulnerabilities may be eligible for a bounty — we evaluate severity case-by-case and respond with an offer when applicable.
Hall of fame
(This page will list confirmed reporters once we've received and resolved our first reports.)
Related
- Security & privacy → — what we collect and protect.