• 플랫폼
    플랫폼
    • Workato ONE의 강점
    • Workato를 선택하는 이유
    • 연결성
    • 엔터프라이즈 보안
    • 가격
    엔터프라이즈 오케스트레이션
    • 엔터프라이즈 iPaaS
    • Enterprise Skills
    • API 관리
    • MCP Gateway
    • 데이터 오케스트레이션
    • AI 워크플로우
    • 데이터 허브 / MDM
    • AI 코파일럿
    • B2B / EDI
    • 워크플로우 봇 & 앱
    • Intelligent Document Processing (IDP)
    리소스
    • 맞춤형 에이전트 구축
    • Agent Orchestration
    • 엔터프라이즈 검색
    임베디드 iPaaS
    • 임베디드 사례
    • 임베디드 통합
    • Why Embed
    • 임베디드 사례
  • 에이전트
    에이전트
    • 마케팅
    • 세일즈
    • 고객 경험
    • 서포트
    • 인사 & 채용
    • IT
    • 보안
    • 자체 제작 에이전트
    • 모두 보기
    Featured Genie
    • Hubspot이 100시간 이상의 작업 시간을 어떤식으로 절약했는지 알아보세요

      Hubspot이 100시간 이상의 작업 시간을 어떤식으로 절약했는지 알아보세요 cta

  • 솔루션
    앱별
    • Salesforce 통합
    • Slack 통합
    • Marketo 통합
    • Netsuite 통합
    • ServiceNow 통합
    • Workday 통합
    모두 보기
    업무별
    • IT
    • 재무
    • 지원
    • HR
    • 마케팅
    • 고객지원
    • RevOps
    • 제품(임베디드)
    사용 사례별
    • O2C
    • 직원 온보딩
    • 엔터프라이즈 iPaaS
    • 제품 주도 판매
    • 임베디드 통합
    모두 보기
    산업별
    • 제조업
    • 금융 서비스
    • 리테일
    • 물류
    • 헬스케어
    • 미디어
    • BPO
    • 비영리 단체
  • 리소스
    리소스
    • Case Studies
    • 전자책
    • 백서
    • 팟캐스트
    모두 보기
    이벤트
    • Workato 컨퍼런스
    모두 보기
    블로그
    • The Connector
    • 제품 업데이트
    고객 성공
    • 문서
    • 서포트
    • 전문가에게 문의하기
    • Academy
    DEVELOPERS
    • デベロッパーポータル
    • Workato 아카데미
    • MCP
    • CLI
  • 파트너
    Workato 네트워크
    • 파트너 검색
    • 파트너 신청
    • 기술 파트너
    • 시스템 통합업체
    Featured Content
    • 추천 콘텐츠: AWS 마켓플레이스에서 Workato를 이용해 보세요

      추천 콘텐츠: AWS 마켓플레이스에서 Workato를 이용해 보세요 cta

  • US (English)대한민국 (한국어)日本 (日本語)
  • Login Europe Singapore Japan Australia Israel
  • 평가판 신청
    Let's chat
Back to legal

Responsible Disclosure Page

Last updated: January 14, 2026

RESPONSIBLE DISCLOSURE (Vulnerability Disclosure Program)

Workato values the work of the security research community and encourages responsible reporting of security vulnerabilities in our products and services. If you believe you have identified a security issue, please report it promptly so we can investigate and remediate it in a coordinated manner.


DISCLOSURE PROGRAM GUIDELINES

When reporting a vulnerability, we ask that you follow these guidelines to help ensure a safe and effective disclosure process:

  1. Review this policy before beginning or submitting any security research.

  2. Submit your report using the reporting form provided at the bottom of this page. Please include as much detail as possible, including clear steps that allow our security team to reproduce and locate the identified vulnerability.

  3. Do not take advantage of the vulnerability you discover. For example, do not download more data than necessary to demonstrate the vulnerability and do not delete or modify data belonging to others.

  4. Do not access customer or employee personal information or confidential information. If you accidentally access any of these, please stop testing and submit the vulnerability.

  5. Do not disclose the vulnerability to others until it has been resolved or a coordinated disclosure timeline has been agreed upon. Public disclosure prior to remediation may increase risk to users.

  6. Do not use prohibited testing techniques, including attacks on physical security, social engineering, distributed denial-of-service (DDoS), spam, or attacks against third-party applications or services.

  7. Provide sufficient information for reproduction. In most cases, this includes the affected URL, endpoint, workflow, or component, along with a description of the issue. Complex vulnerabilities may require additional explanation or proof of concept.

  8. Allow a reasonable amount of time for response and remediation. We aim to acknowledge reports promptly, but time to resolution will depend on severity and complexity.

  9. Identification is encouraged. Workato may choose not to contact or otherwise interact with reporters who decline to identify themselves when submitting a report.

  10. Securely delete Workato information that may have been downloaded, cached, or otherwise stored on the systems used to perform the research.


NONCOMPLIANCE

Workato does not authorize, permit, or otherwise allow any activity that is illegal or in violation of this policy, Workato’s Terms of Use, or applicable law.

You are required to comply with all applicable laws and regulations relevant to security research activities. If you engage in activities inconsistent with this policy, you may be subject to criminal and/or civil liability.

You must not:

  • Access, acquire, remove, download, or modify data residing in an account that does not belong to you

  • Destroy, corrupt, or attempt to destroy or corrupt data or information not owned by you

  • Execute or attempt to execute any denial-of-service (DoS or DDoS) attack

  • Post, transmit, upload, link to, send, or store malicious software

  • Test in a manner that results in unsolicited or unauthorized spam, bulk messaging, or degradation of service

  • Test third-party applications, websites, or services that integrate with or link to Workato, except as expressly permitted for testing Workato functionality

  • Exploit a security vulnerability beyond the minimum testing required to demonstrate its existence

In summary, we ask that you refrain from harming or compromising Workato systems, violating Workato’s rights, the rights of third parties, or applicable law.


SCOPE

This program applies to security vulnerabilities affecting Workato-owned and controlled systems, products, and services.

If you have identified a potential vulnerability (excluding the out-of-scope issues listed below) in any system or asset you reasonably believe belongs to or is operated by Workato, please submit it through this program.


OUT-OF-SCOPE VULNERABILITIES AND ATTACKS

The following vulnerability classes and attack types are out of scope for this program and are not eligible for testing or reporting:

  • Physical security testing

  • Social engineering (including phishing, vishing, and smishing)

  • Denial-of-service or resource exhaustion attacks

  • Clickjacking on pages with no sensitive actions

  • Cross-site request forgery (CSRF) on unauthenticated or non-sensitive forms

  • Attacks requiring man-in-the-middle capabilities or physical access to a user’s device

  • Previously known vulnerable libraries without a working proof of concept

  • CSV injection without demonstrated exploitability

  • Missing SSL/TLS best practices without demonstrated security impact

  • Content spoofing or text injection issues without a viable attack vector

  • Rate-limiting or brute-force issues on non-authentication endpoints

  • Missing Content Security Policy (CSP) best practices

  • Missing HttpOnly or Secure cookie flags without exploitability

  • Missing or incomplete email authentication best practices (SPF, DKIM, DMARC)

  • Vulnerabilities affecting only outdated or unpatched browsers (more than two stable versions behind)

  • Software version disclosure, banner identification, or descriptive error messages

  • Tabnabbing

  • Issues requiring unlikely or impractical user interaction

Any activity that could disrupt Workato services is also considered out of scope.


SAFE HARBOR FOR GOOD-FAITH SECURITY RESEARCH

Workato considers security research conducted in good faith and in compliance with this policy to be authorized. Workato will not recommend or pursue legal action against individuals who responsibly disclose vulnerabilities in accordance with this program.


NO LIMITATION OF LIABILITY TO THIRD PARTIES

While Workato appreciates the reporting of potential vulnerabilities and does not intend to take action against individuals making good-faith efforts to comply with this policy, Workato cannot make representations on behalf of any third party.

To the extent that any security research or vulnerability disclosure activity involves the networks, systems, applications, services, or data of any non-Workato entity (including third-party service providers, customers, or partners), those entities may independently determine whether to pursue legal action or other remedies related to such activities.


RIGHTS AND OBLIGATIONS

You must comply with all applicable laws, rules, regulations, and Workato’s or any third-party applications’ policies and terms of use.

By submitting a report, you represent and warrant that:

  • The report is original to you and you have the right to submit it

  • Submission and use of the report do not violate any third-party rights or applicable law

By submitting a report, you grant Workato the unrestricted right to use the report for any purpose.

All Workato systems, platforms, and information accessed, observed, or acquired as part of this program are owned by Workato or its licensors, providers, or customers. You acquire no rights, title, interest, or ownership in such systems or information.

You may use Workato systems and access information solely for permitted security research activities under this program.

Workato may modify these terms or discontinue this program at any time.


VULNERABILITY SUBMISSION

Please submit vulnerabilities using the embedded HackerOne reporting form below:

    Workato 소개
  • Workato 사용 방법
  • Why Workato
  • 회사 소개
  • 요금 안내
  • 고객
  • 파트너
  • 채용
  • Workato Cares
  • 보도자료/뉴스
  • Predictable Pricing Commitment
    제품
  • 엔터프라이즈 iPaaS
  • Embedded integrations
  • Agentic
  • API 플랫폼
  • Data Orchestration
  • Workflow Bots
  • Low Code Apps
  • B2B/EDI
  • Insights
  • Data Hub / MDM
  • BPM Services
    리소스
  • Demo
  • Workato Conference
  • 설명서
  • Training
  • Certification
  • 고객 성공
  • Company Blog
  • 제품 블로그
  • Integration Library
    Learn
  • iPaaS란 무엇일까요?
  • Why Embed?
  • What is API Management?
  • Software Integration Guide
  • What is Process Automation?
  • Workflow Automation Guide
  • What is a System Integrator?
  • API Integration Guide
  • What is an Embedded iPaaS?
  • Data Integration Guide
  • Cloud Integration Guide
    Contact
  • Contact Sales
  • Contact Support
  • Office Hours
    User Reviews
  • Gartner Peer Insights™
  • G2
  • TrustRadius
대한민국 (한국어)
US (English)대한민국 (한국어)日本 (日本語)
© Workato 2026 Privacy Cookie Settings Email preferences Legal Sitemap Contact: (844) 469-6752
The trademarks WORKATO®, WORKBOT® and WORK JAM® are registered in U.S. Patent & Trademark Office to Workato, Inc.