A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # Canonical URL Canonical: https://megatechnics.info/.well-known/security.txt # Our security address Contact: https://daxis-ict.nl/meld-kwetsbaarheid/ Contact: https://daxis-ict.nl/report-vulnerability/ # Our security policy Policy: https://daxis-ict.nl/meld-kwetsbaarheid/#policy Policy: https://daxis-ict.nl/report-vulnerability/#policy # Hall of fame Acknowledgments: https://daxis-ict.nl/hall-of-fame/ # These are the languages we speak Preferred-Languages: nl,en # Our OpenPGP key Encryption: https://daxis-ict.nl/meld-kwetsbaarheid/ Encryption: https://daxis-ict.nl/report-vulnerability/ Encryption: openpgp4fpr:811100944C94E98784B291AC6C447AC1825F7655 # You shouldn't trust this file, once it has expired (like bad milk) Expires: 2026-04-01T02:54:34Z -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEgREAlEyU6YeEspGsbER6wYJfdlUFAmlV7/oACgkQbER6wYJf dlVwww/9Hsu3WYzTuQY+lL6WxSopTCc4Z4fkpEToxUnDzbnpiTGOHLkmg9Bg4sXh N70+hY/kFTf1HlIZdEXZ3C86d3S5DSdl27Q+XmKNBZeJgqzCYOT+sYS+6cmwW7DA 8wiGjFZzfOxz6luNt6DSRaMPLm1J/Bf2HwRoWRgpZO86MupsUiUBHqti8rFAurKy z2FZ9SDEfFj30H6McHHOB+yyGMVeC/l1R8KjmcqVPV9pJyKeIWOcr2EeUYKbUPs/ PG1cvOu5kjdwir1hxsx7XY0iHS7V6cO6NhwNIIy599jw5hp59DbhBIRbyiLJ42rS DdUIz0CghRkSy2pXkV2MH/xIUdHRMEUbSdRNmo5M0ZS7iSE5gndNc2Jtf2DTcgO8 6jxUqnxOJBGkqpgMkAjg+2zfETuVTprZj0sHPS69GIDgVzTcmMeCVfxjmTCmK2TO Kt2nzeDqIzgj6rNUPJNQv+F0FGxNCbVUECd2DvoH4sXfRBMYnn2J9Yzcg+L1iVTX ALes7oIj5jHF0pGRM912xQX1TWBgUSMxZEiKhgXUida+CpjeQ3X6KbRQ6v5dkkbZ oyZPdZnQ/aRV19oVFzuhx75OHGHDlsrMSXuXJuBhK/qvm3wrHYZgRQ2vGCnKoVha R9L6gCu/ALPCq0sdnDG4mDf2XunVXJFeSQmAoxpXkacZcbTbJdw= =l1n7 -----END PGP SIGNATURE-----
This policy crawled by Onyphe on the 2025-11-02 is sorted as securitytxt.
FireBounty © 2015-2026