A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # Canonical URL Canonical: https://megatechnics.de/.well-known/security.txt # Our security address Contact: https://daxis-ict.nl/meld-kwetsbaarheid/ Contact: https://daxis-ict.nl/report-vulnerability/ # Our security policy Policy: https://daxis-ict.nl/meld-kwetsbaarheid/#policy Policy: https://daxis-ict.nl/report-vulnerability/#policy # Hall of fame Acknowledgments: https://daxis-ict.nl/hall-of-fame/ # These are the languages we speak Preferred-Languages: nl,en # Our OpenPGP key Encryption: https://daxis-ict.nl/meld-kwetsbaarheid/ Encryption: https://daxis-ict.nl/report-vulnerability/ Encryption: openpgp4fpr:811100944C94E98784B291AC6C447AC1825F7655 # You shouldn't trust this file, once it has expired (like bad milk) Expires: 2026-04-01T02:54:34Z -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEgREAlEyU6YeEspGsbER6wYJfdlUFAmlV7/oACgkQbER6wYJf dlUO+BAAnWqb2z3p4Eycraf99wUkadCvjjk/PwMvL1NpTCqqV34MvzusaUBpC0Z2 V6Pi5cNWFGLxqyzOoBUOSlEpZ30K/JkNAd1E3rj+PbMORXb0u6BRxmo8AkASmCsn qWLwSZa+RcPhuDQOaP6LhXV5L1QtAdwPdamaLJM5pJ1XudBb7RM+Ej8u1dTE2TJv aYxpGptj/jWwe0armdTq/aYYciTPrIPV3C/vnBeJMNJEM2n3tV/69uumAdn5KMNY y0Mi0VvaGsTFzi41YD6GxKMOQge1qQOTYlUVCY0Y3Cy/HdC7thoLHNlkmVON6Y6O 1oBGQ3ttNwUjgH30EcxbCvk4l5LWIJrApW9X8STo0+2M3piJcddTM/fkMZf2Heor WcXNyjSM5mB8gT1BldvYpAo4N/LXB8ntTnnNi5yMrxyr+CddOaKHeMBHw/y1fRij Tw56WM4Ol98/sC9Mcxy6BmBj2zw4Yw/lGKZLmozYepyLVdfd9OfCs6PgBnUDds8a 77Y64FAxRquUWozYGAJGeIoHS7I18LRMYIi2D5z0ezylwt63BSahRjiOVx5TLcxj 3Gp6QBd3l79x9uv/mPbwT9YNC6oDAXLPCna8I4LErXj8gP0FdXLReGGcRRjt0Iyz fNnZGDOu5JH+XlT8gmO9Y0CBaSI9cXoWsvuMw7cvX73+bzv9KVQ= =vH45 -----END PGP SIGNATURE-----
This policy crawled by Onyphe on the 2025-11-02 is sorted as securitytxt.
FireBounty © 2015-2026