A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # Canonical URL Canonical: https://mycloudmail.nl/.well-known/security.txt # Our security address Contact: https://daxis-ict.nl/meld-kwetsbaarheid/ Contact: https://daxis-ict.nl/report-vulnerability/ # Our security policy Policy: https://daxis-ict.nl/meld-kwetsbaarheid/#policy Policy: https://daxis-ict.nl/report-vulnerability/#policy # Hall of fame Acknowledgments: https://daxis-ict.nl/hall-of-fame/ # These are the languages we speak Preferred-Languages: nl,en # Our OpenPGP key Encryption: https://daxis-ict.nl/meld-kwetsbaarheid/ Encryption: https://daxis-ict.nl/report-vulnerability/ Encryption: openpgp4fpr:811100944C94E98784B291AC6C447AC1825F7655 # You shouldn't trust this file, once it has expired (like bad milk) Expires: 2026-05-03T02:38:38Z -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEgREAlEyU6YeEspGsbER6wYJfdlUFAmmBbb4ACgkQbER6wYJf dlWMzg//RY5Gl144kf0cE1UTcI//dKXixU/7yx2NAvUdWAP5c8ATdYmMLZZArJEt CYbYFkixl1KUXaECb/aoA4pr88L+KAN4qegIHwIe9j3ExvIA7R9ADLt5RHvodPSv kBn1lSR7iC19w1DBKr61KV7/AiCh2Chgd5p+EIjWzS5E4haEa1apxMAJIzyHO1S5 oO1p3lpU26xPM2yIbxwT1LdoseAzjFz/UjdU30yLT2b5APfbtqm+kd2YJdrustWq 56c3z4+BKt9JtM4I0dyGHVrgCIAPgRkG3nWkiMZ5Ds+8E2CD1FpBFIRQEbE09Pg2 JtoK+c5IU0C5EazIA4AbF1Z/MyT5GE6ennyJpG2VwszlKFqT3iO32qaHz1iYTxYA Wlse6H3SeTLOtGdHiz4JrU1JakdWyRMXytf9NJ2cjpsAT4zogvQFcez04XcXHu04 KAheG8p99ZSTMW6Rf53vLaPwPrlGJxnovuCfrCixxAJOk1QRTRvMbzt8H8Mkj4Gn b3v+P4vO8WZd30Uo7n1yyf8mZ95LZlfSwFUsfUDhzg1crbHJz/XudHoTDn3uXcvn yX1UZPAJoivvwvwKRBhTK92msoSV0leqwoGAlggFXlOcVeU5UVXNjUfS8oXVjR1l dgxRG1gryzpDdqkT2kjZZY5Cwr1CbT4u5VrpM5Yn29CmDepunCU= =TeLP -----END PGP SIGNATURE-----
This policy crawled by Onyphe on the 2023-03-16 is sorted as securitytxt.
FireBounty © 2015-2026