ceven

Responsible disclosure

Report something to our security team

Ceven runs procurement workflows for companies that trust us with their vendor data, employee records, and financial history. If you believe you've found a way to compromise any of that, we want to hear from you. This page lays out the scope we treat as valid, the promises we make to researchers who report in good faith, and how to reach us.

How to report

Email security@ceven.io with a proof of concept, reproduction steps, and the impact you observed. Our security team monitors this address continuously; we acknowledge every report within two business days. If you don't hear back, resend — it means we didn't see it.

If the issue is actively being exploited or you need to discuss something time-sensitive, put URGENT in the subject line. We route urgent mail to an on-call pager.

The machine-readable version of this policy lives at /.well-known/security.txt per RFC 9116.

Scope

The following assets are in scope:

The following are out of scope. Reports on these will be closed as informational:

What we commit to

If you report a vulnerability in good faith under this policy:

What we ask of you

What we consider high impact

The fastest way to our attention — bugs in these categories get same-day remediation commitments:

Transparency

We publish controls, subprocessors, and certification status on our Trust page. If you need SOC 2 or other documentation for a security review, email compliance@ceven.io. We respond to customer compliance requests within one business week.

Last reviewed: April 20, 2026. Policy expires April 20, 2027 — watch this page or check security.txt for the current version.