Security · Vulnerability Disclosure

Security at Manera

Manera is built by a solo founder in partnership with Claude. That makes our supply chain unusually small, but it also means we cannot afford a slow response when things go wrong. This page is our public commitment to how we handle security — for researchers, for customers, and for auditors.

Report a vulnerability: [email protected]

1. Vulnerability disclosure policy

If you've found a security vulnerability in any Manera product or domain, we want to hear from you. Email [email protected] with:

Our service-level commitments

24hAcknowledgement
7dCritical fix
30dHigh / Medium fix

On resolution we publish a CVE (where applicable), credit the reporter (if they wish), and update the affected sub-app's changelog. We do not gag researchers, and we do not require a non-disclosure agreement before discussing technical details.

2. Scope

In scope — every domain we operate, including:

Out of scope — third-party services we use as sub-processors. Report these directly to the vendor:

Volumetric attacks, social-engineering attacks against Manera staff, and physical-security tests against any of the above third parties are also out of scope.

3. Safe harbor

Researchers acting in good faith will not face legal action from Manera Technologies Inc.

If you make a reasonable, good-faith effort to comply with this policy, we will not initiate or support any legal action against you for your research, including under Canadian Criminal Code §342.1 (unauthorized use of computer), the U.S. Computer Fraud and Abuse Act, or equivalent statutes in your jurisdiction. We will work with you to resolve the issue and credit you publicly if you wish.

What "good faith" means in practice:

4. Bounty program

Manera does not currently offer cash bounties. We're a one-person company in early revenue and we'd rather spend that money on engineering quality than on a marketing-grade bug-bounty program. We do offer:

Establishing a structured cash bounty program is on our roadmap once we cross $1M ARR. We will announce it on this page when it goes live.

5. Compliance posture

6. Sub-processors

The following third parties process customer data on our behalf. We give 30 days' notice before adding any new sub-processor with access to customer data.

7. Security practices

8. Recent improvements

We publish a public status page and a portfolio-wide changelog summary at /status. Material security improvements are also written up in the affected sub-app's documentation. As of May 2026: 78% prompt-caching coverage across the AI surface, governed inference paths in 25/25 apps, single-source DPA propagation across all domains.

9. /.well-known/security.txt

We publish a machine-readable security disclosure pointer at /.well-known/security.txt per RFC 9116. Automated vulnerability-disclosure tooling can use that file to discover the contact channel without parsing this page.

Questions? Reach the founder directly: [email protected]
Manera Technologies Inc. · About · Trust · Privacy · Terms · DPA · security.txt