How to responsibly report security vulnerabilities to Entrello
Last updated: April 2026
At Entrello, we take the security of our products and the privacy of our users seriously. We welcome reports from security researchers and the broader community who help us identify and resolve vulnerabilities responsibly. If you believe you have found a security vulnerability in any of our products, we encourage you to let us know as soon as possible. We will investigate all legitimate reports and do our best to quickly address the issue.
The following assets are in scope for responsible disclosure:
| Asset | Description |
|---|---|
| entrello.app | Web application |
| iOS App | Entrello on the Apple App Store |
| Android App | Entrello on Google Play |
| API | All endpoints under entrello.app/api |
| Backend infrastructure | Servers, databases, and cloud services operated by Entrello |
We welcome reports on vulnerabilities that demonstrate a concrete impact on the confidentiality, integrity, or availability of our systems or user data. Examples include authentication bypasses, injection flaws, unauthorised data access, and privilege escalation. A working proof of concept is required.
Activities that are not authorised:
Findings that generally do not qualify:
Reports that consist solely of items in the lists above, or that are mass-mailed from automated scanners, may be closed without a substantive response.
Please submit vulnerability reports by email to:
sec@entrello.io
For sensitive reports, please encrypt your message using our PGP key: https://www.entrello.app/.well-known/pgp-key.txt
Your report should include:
| Milestone | Timeframe |
|---|---|
| Acknowledgement of your report | Within 5 business days |
| Confirmation of validity | Within 14 days |
| Status update on remediation | Every 14 days |
| Resolution of critical issues | As quickly as practicable |
| Resolution of high severity issues | Within a coordinated timeline |
We will keep you informed throughout the process and notify you when the vulnerability has been resolved.
Entrello will not take legal action against researchers who:
We consider responsible security research conducted under these guidelines to be authorised activity and will work with researchers rather than against them. This authorisation does not extend to research that violates applicable law, accesses or modifies data that does not belong to you, degrades the service for others, or demands payment in exchange for findings.
We ask that you give us a reasonable amount of time to resolve a reported issue before public disclosure. We will agree on a disclosure timeline together based on the severity and complexity of the fix.
If we are unable to resolve an issue within 90 days, we support your right to publish your findings, and we will work with you on the timing.
We do not currently operate a paid bug bounty programme. By submitting a report, you acknowledge that any reward is at our discretion, that you have no expectation of payment, and that you waive any future claim for compensation. Demands for payment in exchange for vulnerability information are not in scope of this policy and will not be entertained.
We are happy to publicly acknowledge researchers who report valid, in-scope vulnerabilities, on request.
Email: sec@entrello.io
PGP Key: https://www.entrello.app/.well-known/pgp-key.txt
security.txt: https://www.entrello.app/.well-known/security.txt