Security of Area

Published on October 1, 2024

SOC 2 Type II compliance

The SOC 2 Type 2 is an audit report performed by an independent third-party certified by the American Institute of Certified Public Accountants (AICPA) to evaluate a service organization's controls related to the Trust Services Criteria (TSC).


The SOC 2 Type 2 report assesses the effectiveness of these controls over a period of time and is intended to provide assurance to customers and stakeholders that the organization has implemented adequate controls to protect their data.


Bug bounty

Please report security vulnerabilities of any Area products through our bug bounty program. We’ll respond as soon as we can, usually within 72 hours. Our security focus is on strong auth (sign-in, sessions, account recovery), access control (bypasses, faults, CSRF), and injection prevention (SQL, XSS, method args).


Area rewards reporters who submit original, in-scope vulnerabilities. We evaluate each report based on its criticality, impact, and risk to our customers and company. Our minimum reward is $100, with larger rewards or bonuses possible for critical vulnerabilities, creative exploits, and insightful reports.


Status tracker

Explore real-time status of Area applications and services.