Security best practices at LightNit

We take pride in our information security program and are dedicated to its continual improvement.

img
img
img
img

Vulnerability management

Threat detection

We have enabled threat detection software and enforce continual threat modeling exercises to identify and plan for any vulnerabilities in our environment.

Security bug bounty program

LightNit's security exploit bug bounty program acknowledges and rewards the work independent security researchers do by flagging vulnerabilities LightNit might not be aware of. We look at each vulnerability on a case-by-case basis.

If you find something to report, please keep these three key points in mind:

1. Please let us know about any vulnerabilities as soon as possible.

2. Don't test against LightNit users' private data.

3. We welcome the opportunity to work together and close the vulnerability before it's revealed to others.

External penetration testing

LightNit undergoes an external penetration test by an independent third party on an annual cadence, at minimum.

Plans and pricing

Whether your time-saving automation needs are large or small, we're here to help you scale.