MultiMail welcomes good-faith vulnerability reports that help protect agent email infrastructure, operators, and email recipients. Please report suspected security issues to [email protected].
Send reports to [email protected]. Include a concise description, affected URLs or endpoints, reproduction steps, observed impact, and any logs or screenshots that help us validate the issue. Please avoid including third-party personal data unless it is necessary to demonstrate the vulnerability.
We aim to acknowledge valid vulnerability reports within 5 business days. We target remediation or a clear status update within 90 days before public disclosure, unless active exploitation, legal obligations, or user safety require a different timeline. We will keep reporters informed as we triage and remediate.
We will not pursue legal action against researchers who make a good-faith effort to comply with this policy, avoid privacy violations, avoid service disruption, and promptly report vulnerabilities. Research must be limited to what is necessary to confirm a vulnerability and must not involve data destruction, persistence, extortion, social engineering, spam, phishing, or access to unrelated accounts.
api.multimail.devmcp.multimail.devmultimail.devWe may recognize researchers who submit valid, previously unknown vulnerabilities and follow this policy. Acknowledgment is optional and will be published only with the reporter's consent.
Security reports: [email protected]
Legal and privacy requests: [email protected]
Ghst Particle, LLC
Montana, United States