Important announcement
Transition to private Bug Bounty program
We are excited to announce that we are transitioning our public Bug Bounty program to a private, invitation-only program. This change will allow us to focus our efforts and resources on collaborating with a select group of trusted security researchers.
Effective date
Please note that as of May 26th, we will close our public Bug Bounty program.
You can still report findings through our Vulnerability Disclosure Program (VDP), but no reward will be given. We thank you for your understanding and continued support. Together, we can ensure the security and privacy of our users.
Built on trust, transparency, and collaboration
Think you might have discovered a security vulnerability in one of our products? Then you’ve come to the right place. Our dedicated team is ready to work with you to resolve it as quickly as possible.


Scope of the program
Vulnerabilities affecting the products that are maintained as per our product lifecycle will be investigated and worked on by our team. In addition to the products, the following domains are also presently in this scope:
- *.clearance.network
- *.clearid.io
- *.genetec.cloud
- *.genetec.com
- login.genetec.com
- *.genetec.one
- *.geneteccloud.com
- *.q2c.eu
- *.autovu.com
- *.curbsense.com
- *.autovu.cloud
Which vulnerabilities can you report?
Qualifying vulnerabilities
- Authentication flaws
- Circumvention of our platform/privacy permission models
- Elevation of privileges
- Cross-site scripting (XSS)
- Cross-site request forgery (CSRF/XSRF)
- Remote code execution
- SQL Injection
- Local file inclusion
- Insecure direct object reference
- Server-side request forgery
Out-of-scope vulnerabilities
- Vulnerabilities that rely on social engineering (this includes phishing attacks against Genetec employees)
- Denial of Service Attacks (DOS)
- Physical attempts against Genetec property or data centers
- Attack that assumes admin control of a service machine
- Missing best practices with no demonstrable security impact (i.e. missing HTTP headers, SSL/TLS configuration, etc.)
- Insecure cookies for non-sensitive cookies or 3rd party cookies
- Sending blind XSS by email or spamming Genetec employees
- Vulnerable third party packages without proof of concept (ex. jQuery)
- Missing DNS CAA record