At Daytona, we take security seriously. If you believe you have found a security vulnerability in any Daytona-owned repository or service, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please email us at: security@daytona.io
You can also report vulnerabilities privately through GitHub's security advisory feature.
Please include:
- Description of the vulnerability
- Steps to reproduce
- Impact assessment
- Any relevant screenshots or proof-of-concept
We will acknowledge receipt within 2 business days and provide an initial assessment within 5 business days.
The following assets and areas are in scope for vulnerability reports:
- Daytona platform — app.daytona.io, including the web application and management interfaces
- API and SDK — all documented and undocumented API endpoints, client SDKs
- Sandbox runtime isolation — escape from sandbox to host, cross-tenant access, isolation boundary bypasses
- Authentication and authorization — SSO, API key management, session handling, privilege escalation across accounts or organizations
- Secrets management — scoped secret injection, unauthorized access to secrets, leakage across sandbox boundaries
- Public GitHub repositories — any repository under the daytonaio organization
The following categories are excluded from this program. Reports in these categories will be closed without further assessment unless they demonstrate impact beyond what is described.
- In-sandbox privilege escalation, root access, or capability use — Daytona sandboxes provide full root access within user-namespace isolation by design. Findings that chain to host escape or cross-sandbox access remain in scope.
- Findings within the reporter's own sandbox that do not demonstrate impact beyond that sandbox's isolation boundary.
- Denial of service — DoS, DDoS, resource exhaustion, volumetric testing, or network flooding.
- Rate limiting observations that do not demonstrate resource exhaustion, financial impact, or abuse potential.
- Social engineering — phishing, vishing, pretexting, or any form of social engineering targeting Daytona employees or users.
- Physical security testing of offices, data centers, or personnel.
- Marketing and documentation sites — findings against daytona.io or docs.daytona.io, excluding subdomain takeover vulnerabilities.
- Third-party services — vulnerabilities in services or platforms not owned or operated by Daytona.
- Known public files or directories — e.g., robots.txt, .well-known, or other intentionally public resources.
- DNSSEC or TLS cipher suite configuration suggestions without a demonstrated exploit path.
- Missing Secure/HTTPOnly flags on non-sensitive cookies.
- CSRF on unauthenticated or public-facing forms.
- Outdated browsers and platforms — vulnerabilities only affecting unpatched or end-of-life software.
- Automated scan output — reports generated solely by automated tools without validated proof of impact.
- Best practice recommendations without demonstrable security impact.
- Spam or service degradation — testing that results in sending unsolicited messages or degradation of service to other users.
We accept vulnerability reports for the latest stable release of Daytona.
Daytona supports safe harbor for security researchers who act in good faith and in accordance with this policy.
We will not pursue legal action against researchers who:
- Make a good-faith effort to avoid privacy violations, data destruction, and service disruption
- Only access data to the extent necessary to demonstrate the vulnerability
- Do not exfiltrate, retain, or disclose any user data encountered during research
- Report findings promptly through the channels listed above
- Do not disclose findings publicly before coordinated resolution (see Disclosure Timeline below)
- Comply with all applicable laws
If legal action is initiated by a third party against a researcher for activities conducted in accordance with this policy, we will take steps to make it known that the research was authorized.
This safe harbor applies to all Daytona services and assets listed in the Scope section.
We follow a coordinated disclosure process:
- 90 days — We target remediation within 90 days of a validated report. Complex issues may require additional time, and we will communicate timelines transparently.
- 30 days post-patch — After a fix is released, we ask that researchers wait 30 days before public disclosure to allow users to update.
- No response — If we fail to acknowledge or respond to a report within 90 days, the researcher may proceed with public disclosure after providing 14 days advance written notice to security@daytona.io.
We offer rewards from $100 to $1,000 for valid, original findings that demonstrate real security impact. Severity, exploitability, and report quality are all considered. Duplicate reports are credited to the first submission.