Our Approach to Security
At McIntosh, product security is built into how we design, develop, and support our products, software and related services. We approach security with the same mindset we apply to all innovation at McIntosh: continuous improvement, thoughtful engineering, and a strong focus on our customers. McIntosh has a dedicated team focused exclusively on product security. This team is responsible for identifying security requirements, conducting technical analysis such as source code review, and evaluating potential risks across the product lifecycle.
McIntosh maintains a product security framework designed to proactively identify, assess and address potential security defects in our products. Wherever possible, we work to prevent vulnerabilities by incorporating appropriate security measures early in the product lifecycle.
Reporting a Security Vulnerability
If you believe you have identified a security vulnerability affecting a McIntosh product, software, or related service, please report it through our online vulnerability submission form hosted by HackerOne. McIntosh partners with HackerOne as part of our vulnerability disclosure program to help receive, coordinate, and manage vulnerability reports from the security research community.
Information to Include in Your Report
Providing the following details, where available, will help us review your report more efficiently:
- Product or software name
- System version
- Steps to reproduce the issue
- Description of the vulnerability and any suggested mitigations
- Potential impact of the vulnerability
What to Expect When Submitting a Report
McIntosh reviews all reports that are submitted directly to us. After you submit your research through our online submission form, you will receive an automatic email confirming we have received your report. Most reports will be acknowledged by our product security team within 72 hours.
If you create a free HackerOne account, you will receive periodic status updates on your report and be able to communicate with our team as the report is reviewed.
Please note, McIntosh will always act on any reported vulnerabilities in a timely manner. However, the timing and frequency of updates may vary depending on the nature and complexity of the issue.
McIntosh Contact Information
If you wish to contact us or have any questions, please email us at [email protected] or visit our Contact Us page for additional McIntosh contact information.