A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
Contact: mailto:security@complyusa.com Expires: 2026-12-31T23:59:59.000Z Preferred-Languages: en Canonical: https://complyusa.com/.well-known/security.txt # Security Policy This system handles CMMC 2.0 Level 2 Controlled Unclassified Information (CUI). Please report security vulnerabilities responsibly. # Reporting Process 1. Email security@complyusa.com with details 2. Do not publicly disclose until fix is released 3. Allow 90 days for remediation 4. Expect response within 48 hours # Scope - Authentication & Authorization bypasses - Data exposure vulnerabilities - Cross-Site Scripting (XSS) - SQL Injection - Cross-Site Request Forgery (CSRF) - Server-Side Request Forgery (SSRF) - Remote Code Execution (RCE) - Access control issues # Out of Scope - Social engineering attacks - Physical security - Denial of Service (DoS) - Issues in third-party services # Safe Harbor We support responsible vulnerability disclosure and will not pursue legal action against researchers who follow this policy.
This policy crawled by Onyphe on the 2025-10-12 is sorted as securitytxt.
FireBounty © 2015-2025