Wyapy is committed to protecting the confidentiality, integrity, and availability of our systems and customer data. This Security Policy describes how we manage security, how to report vulnerabilities, and what you can expect from us.
If you believe you have found a security vulnerability in Wyapy, please report it to:
Please include:
We ask that you do not publicly disclose the issue until we have had a reasonable opportunity to investigate and remediate it.
We aim to:
Timelines may vary depending on complexity, third-party dependencies, and deployment constraints.
We use a combination of technical and organizational measures designed to reduce risk, including:
Wyapy processes survey data (ratings and optional comments) and service metadata in order to operate and improve the service. Please refer to our Privacy Policy for details on what we collect, how we use it, and retention/deletion practices.
Wyapy may rely on third-party services for hosting, monitoring, analytics, payments, and content delivery. We take steps to select reputable providers and limit data shared to what is necessary to operate the service.
Security updates and fixes are applied to the production Wyapy service. If you self-host any components or use pinned client versions, you are responsible for deploying updates in a timely manner.
We may perform security testing and hardening activities such as dependency vulnerability scanning and configuration reviews. Wyapy does not currently provide a formal bug bounty program unless explicitly stated otherwise.
We will not pursue legal action for security research conducted in good faith that:
We may update this Security Policy from time to time. Updates will be posted on this page with a revised “Last Updated” date.
For security issues, please contact:
Last Updated: January 2026