Vulnerability Disclosure Policy

Last Updated: April 14, 2026

Our Commitment

Otter Products, LLC (“we”) is committed to maintaining the security of our digital properties and protecting our systems and the information we process as part of providing our products and services, including customer, reseller, distributor, and vendor information. We appreciate the efforts of individuals who responsibly report potential security vulnerabilities, so they can be reviewed and addressed appropriately.

This Vulnerability Disclosure Policy (“Policy”) outlines how you can report potential security vulnerabilities and sets our expectations for your responsible disclosure.

Scope

This Policy applies to previously unknown, original security vulnerabilities affecting our websites, applications, or systems.

The following are out of scope and are not covered by this Policy:

  • Security vulnerabilities that are already known internally or have been previously reported;
  • Denial of service (DoS), distributed denial of service (DDoS), or other volumetric or availability based attacks;
  • Social engineering, phishing, or physical security attacks; and
  • Issues resulting from misconfigured client devices, browsers, or third party services outside our control.

Authorized Activity

We do not authorize security research, testing, scanning, probing, or other interactions that could reasonably be interpreted as an attack against our websites, applications, systems, or users.

Any activity that degrades service availability, accesses data without permission, circumvents our controls, or impacts our customers or operations is not permitted, even if conducted with good intentions.

Submission of a security vulnerability report does not grant you permission to perform further testing or verification.

Bug Bounty

We do not currently operate a paid bug bounty program, and do not offer compensation, rewards, or public acknowledgement in exchange for reported security vulnerabilities.

How to Report a Vulnerability

If you believe you have identified a security vulnerability that falls within the scope of this Policy, please submit a security vulnerability report to bugs@otterproducts.com

To help us efficiently evaluate your report, please include:

  • A clear description of the issue;
  • The affected system, page, or endpoint;
  • Steps to reproduce the security vulnerability (if applicable); and
  • Any relevant screenshots or non sensitive logs.

Please do not include sensitive personal data, payment information, or actual customer data in your report.

Our Handling Process

Upon receipt of a qualifying security vulnerability report, we will:

  • Review the submission to validate the issue.
  • Assess potential impact and risk.
  • Determine appropriate remediation actions.

Due to operational and security considerations, we may not provide status updates, timelines, or detailed outcomes for reported issues.

No Guarantee of Action or Response

Submission of a security vulnerability report does not guarantee a response, remediation, or acknowledgment. We retain sole discretion over how reported issues are handled, prioritized, or resolved.

Safe Harbor

This Policy is intended to encourage responsible reporting of security vulnerabilities; however, we reserve all legal rights and remedies and do not waive any protections, defenses, or claims by receiving or reviewing security vulnerability reports.

Changes to this Policy

We may update this Policy from time to time to reflect changes in our practices or legal requirements. This Policy is effective as of the last date it was updated.

Recognition

We recognize the efforts of individuals who chose to responsibly disclose potential security vulnerabilities in accordance with this Policy and have helped contribute to a safer online environment:

  • Sumit Tiwari
  • Mridul Vohra
  • Zain Iqbal
  • Sundarr Insa
  • Kunal Mhaske
  • G. Bharath Kalyan
  • Abdul Rauf Memon
  • Mohd Farzaan
  • Yash Raj
  • Oluwafemi Adeleye
  • David Stephenson
  • Aqib Naeem
  • Parth Narula