A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # Canonical URL Canonical: https://rijssenholten.org/.well-known/security.txt # Our security address Contact: https://daxis-ict.nl/meld-kwetsbaarheid/ Contact: https://daxis-ict.nl/report-vulnerability/ # Our security policy Policy: https://daxis-ict.nl/meld-kwetsbaarheid/#policy Policy: https://daxis-ict.nl/report-vulnerability/#policy # Hall of fame Acknowledgments: https://daxis-ict.nl/hall-of-fame/ # These are the languages we speak Preferred-Languages: nl,en # Our OpenPGP key Encryption: https://daxis-ict.nl/meld-kwetsbaarheid/ Encryption: https://daxis-ict.nl/report-vulnerability/ Encryption: openpgp4fpr:811100944C94E98784B291AC6C447AC1825F7655 # You shouldn't trust this file, once it has expired (like bad milk) Expires: 2026-06-01T07:49:55Z -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEgREAlEyU6YeEspGsbER6wYJfdlUFAmmj/bMACgkQbER6wYJf dlUdKg/+MnzvS0u7/uXU6iu8BNr2aZw52FNmJ1AScMBciSX77aNmrOItHXQGHtce zZOBq7nuncEW8JqC7DpuoAU0Xejs2/2T2doP48Mj0oU97fcunHfCDrWQGf4gSEad QvnSvVoEIVYo2zEeKXtBtaeIyU1v7WfLrMLvfg7XO0W8TuyBxWDlJCps28sN5ISg mEhRaoHikNj9BGKp2Oj9F9k9du20gDmazEnVXp0TfjTB93N6j7DJh5fUCGp+yoHL q9RSQnW2Bsnimy4rGHMgL+nE/oJhDulAYqNPEHtWQjUj8seFPfh5yrms9eyTjbir GrUb3bsRIC2HLF2qKZH6njpeN8oaE6i9Orw6NPsrGC5eyJFAjeStgh/+ZvI+V4Z0 695mhrJPB0Fw+JMoeDRsH52L2klPmlnlE9SlzNCGtqzUSG+Hun026q1K5VWEPree le/5bII77glTmQUH3mcfEeyFY44Xn0g0ZwnEq0jaK4cJac2RfvByj6b7SJC6O3GX bG9K4UPU/G7Uix/Q/BZmrXOxfBC+QR7knaADwuGMOqHYuTKJfMRJYemmxWCxslZS WyjHRW56nixnWr1hhGAXGN8fduVc1+kopn1verOkvF/HFG1RxWvmgi16jltWzgAE CmMTonFdqBT0apWCRteOWixYM4tXg91ozy55WGFj/o7n5lIUHis= =Lk9L -----END PGP SIGNATURE-----
This policy crawled by Onyphe on the 2026-03-01 is sorted as securitytxt.
FireBounty © 2015-2026