At PAIR, we take security seriously.
If you believe you’ve found a security vulnerability in PAIR, we encourage you to report it to us responsibly. We appreciate the role that security researchers can play in helping us protect our systems, our customers, and their data.
This approach is aligned with how we want to operate as a company: transparent by default, thoughtful in how we respond, and focused on building trust.
How to report a vulnerability
Please email your report to hello@pairnow.ai
To help us investigate quickly, please include:
a clear description of the issue
steps to reproduce it
the affected URL, account area, or feature
any supporting screenshots or proof of concept
the potential impact as you see it
Please do not share details of the issue publicly until we have had a reasonable opportunity to investigate and remediate it. Responsible disclosure works best when reports are made privately first, with open communication during triage and remediation.
What we ask from researchers
We ask that you act in good faith and avoid:
accessing, modifying, or exfiltrating data that does not belong to you
disrupting our service or degrading the experience for other users
social engineering, phishing, or physical security testing
automated or high-volume testing that could affect platform stability
demanding payment in exchange for disclosure
Please only test against accounts and data you own or are explicitly authorised to use. Industry guidance also recommends clear reporting methods, reasonable timelines, and good-faith behaviour on both sides.
What you can expect from us
If you submit a report in good faith, we will:
acknowledge receipt of your report
investigate and validate the issue
keep you informed as appropriate during triage and remediation
work to resolve legitimate vulnerabilities in a reasonable timeframe
We aim to communicate clearly and respectfully throughout the process. Clear reporting channels, reasonable response timelines, and open communication are all standard parts of a good disclosure process.
Recognition
PAIR does not currently operate a bug bounty programme.
Where a researcher has identified and responsibly disclosed a legitimate vulnerability, we may choose to recognise their contribution publicly on this page, with their permission.
Acknowledgements
We’re grateful to the security researchers who have helped us improve PAIR.
Rahima Abdul Haq
Notes
This page is intended for reporting security vulnerabilities only. For general support, product questions, or account help, please contact help@pairnow.ai
Do your best work faster with AI
Book a short session to see how Pair fits your organisation

At PAIR, we take security seriously.
If you believe you’ve found a security vulnerability in PAIR, we encourage you to report it to us responsibly. We appreciate the role that security researchers can play in helping us protect our systems, our customers, and their data.
This approach is aligned with how we want to operate as a company: transparent by default, thoughtful in how we respond, and focused on building trust.
How to report a vulnerability
Please email your report to hello@pairnow.ai
To help us investigate quickly, please include:
a clear description of the issue
steps to reproduce it
the affected URL, account area, or feature
any supporting screenshots or proof of concept
the potential impact as you see it
Please do not share details of the issue publicly until we have had a reasonable opportunity to investigate and remediate it. Responsible disclosure works best when reports are made privately first, with open communication during triage and remediation.
What we ask from researchers
We ask that you act in good faith and avoid:
accessing, modifying, or exfiltrating data that does not belong to you
disrupting our service or degrading the experience for other users
social engineering, phishing, or physical security testing
automated or high-volume testing that could affect platform stability
demanding payment in exchange for disclosure
Please only test against accounts and data you own or are explicitly authorised to use. Industry guidance also recommends clear reporting methods, reasonable timelines, and good-faith behaviour on both sides.
What you can expect from us
If you submit a report in good faith, we will:
acknowledge receipt of your report
investigate and validate the issue
keep you informed as appropriate during triage and remediation
work to resolve legitimate vulnerabilities in a reasonable timeframe
We aim to communicate clearly and respectfully throughout the process. Clear reporting channels, reasonable response timelines, and open communication are all standard parts of a good disclosure process.
Recognition
PAIR does not currently operate a bug bounty programme.
Where a researcher has identified and responsibly disclosed a legitimate vulnerability, we may choose to recognise their contribution publicly on this page, with their permission.
Acknowledgements
We’re grateful to the security researchers who have helped us improve PAIR.
Rahima Abdul Haq
Notes
This page is intended for reporting security vulnerabilities only. For general support, product questions, or account help, please contact help@pairnow.ai
Do your best work faster with AI
Book a short session to see how Pair fits your organisation

At PAIR, we take security seriously.
If you believe you’ve found a security vulnerability in PAIR, we encourage you to report it to us responsibly. We appreciate the role that security researchers can play in helping us protect our systems, our customers, and their data.
This approach is aligned with how we want to operate as a company: transparent by default, thoughtful in how we respond, and focused on building trust.
How to report a vulnerability
Please email your report to hello@pairnow.ai
To help us investigate quickly, please include:
a clear description of the issue
steps to reproduce it
the affected URL, account area, or feature
any supporting screenshots or proof of concept
the potential impact as you see it
Please do not share details of the issue publicly until we have had a reasonable opportunity to investigate and remediate it. Responsible disclosure works best when reports are made privately first, with open communication during triage and remediation.
What we ask from researchers
We ask that you act in good faith and avoid:
accessing, modifying, or exfiltrating data that does not belong to you
disrupting our service or degrading the experience for other users
social engineering, phishing, or physical security testing
automated or high-volume testing that could affect platform stability
demanding payment in exchange for disclosure
Please only test against accounts and data you own or are explicitly authorised to use. Industry guidance also recommends clear reporting methods, reasonable timelines, and good-faith behaviour on both sides.
What you can expect from us
If you submit a report in good faith, we will:
acknowledge receipt of your report
investigate and validate the issue
keep you informed as appropriate during triage and remediation
work to resolve legitimate vulnerabilities in a reasonable timeframe
We aim to communicate clearly and respectfully throughout the process. Clear reporting channels, reasonable response timelines, and open communication are all standard parts of a good disclosure process.
Recognition
PAIR does not currently operate a bug bounty programme.
Where a researcher has identified and responsibly disclosed a legitimate vulnerability, we may choose to recognise their contribution publicly on this page, with their permission.
Acknowledgements
We’re grateful to the security researchers who have helped us improve PAIR.
Rahima Abdul Haq
Notes
This page is intended for reporting security vulnerabilities only. For general support, product questions, or account help, please contact help@pairnow.ai
Do your best work faster with AI
Book a short session to see how Pair fits your organisation
