security@opencharts.com is the single inbox that covers every
product we operate. Every message lands with the security team — not a
general support queue.
Reporting a vulnerability
Email security@opencharts.com with as much detail as possible. We prefer:- A short description of the issue.
- Reproduction steps — a minimal request, command, or script works best.
- The impact you believe the issue has.
- Your contact info if you want credit.
What happens next
- Within 2 business days: you receive an acknowledgement that a human has read your report.
- Within 7 business days: we share a triage decision (accepted, duplicate, out of scope, needs more info).
- Throughout the fix: we keep you updated and coordinate a disclosure date if one is warranted.
hitheo.ai/.well-known/security.txt.
Scope
In scope
hitheo.ai,api.hitheo.ai,docs.hitheo.ai,artifacts.hitheo.ai- The Theo dashboard, API routes, and the embed widget runtime
- The four public npm packages:
@hitheo/sdk,@hitheo/mcp,@hitheo/telegram,@hitheo/whatsapp - Our GitHub Actions workflows (
.github/workflows/**)
Out of scope
- Denial-of-service testing against our production endpoints
- Social-engineering of our team or customers
- Physical access to our infrastructure
- Issues that require an attacker to already control the victim’s browser, operating system, email account, npm account, or GitHub account
Safe harbor
We will not pursue legal action against researchers who:- Follow this policy in good faith.
- Do not deliberately access or modify other users’ data beyond what’s necessary to demonstrate the issue.
- Avoid techniques that degrade service for other customers.
- Give us reasonable time to fix the issue before public disclosure.
Supply chain: verifying npm provenance
Every official@hitheo/* package ships with an npm provenance
attestation signed by GitHub’s OIDC token. You can verify the tarballs
you install with:
Secrets hygiene
If you find leaked credentials — API keys, database URLs, Clerk secrets, Cloudflare tokens, and so on — in our code, logs, or any public surface, please emailsecurity@opencharts.com. We will rotate
the affected secret and notify customers whose data might have been
exposed.
We maintain a list of secret-shaped patterns in our logger so leaked
values are redacted before they leave the process. A report of a leak
that slipped past our scrubber is especially welcome.