Back to Home
Legal Document

Responsible Disclosure Policy

How to report security vulnerabilities and help us keep Fininvo secure for everyone

Last Updated

February 28, 2026

Effective Date

March 1, 2026

Version

1.0

This Responsible Disclosure Policy is published by Fininvo, a trade name of Prashbi Global Services Pvt. Ltd., a company incorporated under the laws of India (CIN: U52100KA2020PTC133490), with its registered office at Tholons Tower, 346 HIG, 17th Cross Rd, Dollars Colony, R.M.V. 2nd Stage, Bengaluru, Karnataka 560094, India. References to "Fininvo", "we", "us", or "our" in this document refer to Prashbi Global Services Pvt. Ltd..

1

Overview

At Fininvo, security is a top priority. We recognize that the security research community plays a vital role in helping us maintain the security and integrity of our platform. We welcome and encourage responsible security research conducted in good faith.

This Responsible Disclosure Policy outlines the guidelines for security researchers to report vulnerabilities, how we handle reports, and the protections we offer to researchers who follow these guidelines.

Our Commitment: We are committed to working collaboratively with the security community to address vulnerabilities promptly and transparently, keeping our platform secure for all users.

2

Scope

In Scope

  • • fininvo.com
  • • app.fininvo.com
  • • api.fininvo.com
  • • *.fininvo.com (all subdomains)
  • • Fininvo web application
  • • Fininvo REST APIs
  • • Authentication and authorization flows

Out of Scope

  • • Third-party services and integrations
  • • Social engineering attacks
  • • Physical security attacks
  • • Denial of service (DoS/DDoS) testing
  • • Automated scanning without prior approval
  • • Attacks against Fininvo employees
  • • Spam or phishing campaigns
3

How to Report

Please send vulnerability reports to security@fininvo.com. Encrypt sensitive reports using our PGP key, available upon request.

Description

A clear and detailed description of the vulnerability, including the type and potential impact.

Reproduction Steps

Step-by-step instructions to reproduce the vulnerability, including URLs, parameters, and payloads.

Impact Assessment

Your assessment of the severity and potential impact of the vulnerability on users or data.

Contact Information

Your name and email address so we can follow up, coordinate disclosure, and credit your work.

PGP Encryption: For sensitive vulnerability reports, we strongly recommend encrypting your email. Request our PGP public key by emailing security@fininvo.com with the subject "PGP Key Request."

4

Safe Harbor

Our Safe Harbor Commitment

When conducting security research in accordance with this policy, we consider your research to be authorized and will not initiate legal action against you. Specifically:

  • No legal action will be taken against researchers acting in good faith within the scope of this policy.
  • No penalty for accidental data access, provided it is reported promptly and no data is retained or shared.
  • No legal claims will be pursued for security testing that falls within the defined scope of this policy.

Good Faith Requirement: Safe harbor applies only to researchers who make a genuine effort to avoid privacy violations, service disruption, data destruction, and degradation of user experience during their testing.

5

Response Timeline

We are committed to responding to vulnerability reports promptly and keeping researchers informed throughout the process.

Within 48 hours

Acknowledgment

We will confirm receipt of your report and assign a tracking ID.

Within 5 business days

Initial Assessment

Our security team will perform an initial triage and severity assessment.

Ongoing

Regular Updates

We will keep you informed of progress and any questions during investigation.

Typically 90 days

Coordinated Disclosure

We aim to fix and deploy patches before coordinated public disclosure.

6

Recognition & Rewards

We value the contributions of security researchers and believe in recognizing their efforts to make Fininvo more secure.

Hall of Fame

Public acknowledgment on our security page (with your permission)

Fininvo Swag

Exclusive Fininvo merchandise for qualifying vulnerability reports

Severity-Based

Recognition level based on vulnerability severity and impact

7

Rules of Engagement

To ensure the safety and security of our users and systems, all security researchers must adhere to the following rules when conducting testing:

No Data Exfiltration

Do not access, download, or retain any user data beyond what is strictly necessary to demonstrate the vulnerability.

No Service Disruption

Do not perform any testing that could degrade, disrupt, or damage our services or infrastructure.

No Unauthorized Access

Do not access other users' accounts or data. Use only accounts you own or have explicit authorization to test.

Report Immediately

If you discover sensitive data during testing, stop immediately, do not save any data, and report the finding right away.

What NOT to Do

  • No Denial of Service testing — Do not perform DoS or DDoS attacks against any Fininvo systems.
  • No data theft — Do not exfiltrate, copy, or share any data discovered during testing.
  • No social engineering — Do not phish, vish, or otherwise socially engineer Fininvo employees or users.

Report a Vulnerability

PGP Key

Available upon request

Registered Office

Prashbi Global Services Pvt. Ltd.
Tholons Tower, 346 HIG, 17th Cross Rd, Dollars Colony,
R.M.V. 2nd Stage, Bengaluru, Karnataka 560094, India

CIN

U52100KA2020PTC133490