Levitate Vulnerability Program Scope and Rules

In Scope

We are primarily interested in vulnerabilities in the following categories:

Out of Scope

The following vulnerability categories are considered out of scope of our responsible disclosure program and should be avoided by researchers.

Please note that you are expected to engage in security research responsibly. For example, if you discover a publicly exposed password or key, you should not use the key to test the extent of access it grants or to download or exfiltrate data in order to prove it is an active key. Similarly, if you discover a successful SQL injection, you are expected not to exploit the vulnerability beyond any initial steps needed to demonstrate your proof-of-concept. Excessive exfiltration or downloading of Levitate data, or demanding payment in return for destruction of Levitate data, will be considered outside of the scope of this program, and Real Magic will reserve all of its rights, remedies, and actions to protect itself and its users.

Vulnerability Rewards

Our program does not currently provide any monetary rewards.

How to Report a Vulnerability

To report a vulnerability, please send an email to security@levitateapp.com.

Let's get started!

We’ll give you a call to set up time for your team and ours to meet virtually for a personalized demo.

Book a Demo
AI Prompt and Result example featuring an image of Lev the Lion
Triangle Business Journal 2023 Best Places To Work AwardSales and Marketing Technology Awards 2023 "The SAMMY"American Business Awards Silver 2023 Stevie Winner
Excellence in Workplace Culture 2023 AwardG2 Users Love Us2023 AVA Digital Awards Gold Winner