A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # Canonical URL Canonical: https://rijssen-holten.info/.well-known/security.txt # Our security address Contact: https://daxis-ict.nl/meld-kwetsbaarheid/ Contact: https://daxis-ict.nl/report-vulnerability/ # Our security policy Policy: https://daxis-ict.nl/meld-kwetsbaarheid/#policy Policy: https://daxis-ict.nl/report-vulnerability/#policy # Hall of fame Acknowledgments: https://daxis-ict.nl/hall-of-fame/ # These are the languages we speak Preferred-Languages: nl,en # Our OpenPGP key Encryption: https://daxis-ict.nl/meld-kwetsbaarheid/ Encryption: https://daxis-ict.nl/report-vulnerability/ Encryption: openpgp4fpr:811100944C94E98784B291AC6C447AC1825F7655 # You shouldn't trust this file, once it has expired (like bad milk) Expires: 2026-06-01T07:50:50Z -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEgREAlEyU6YeEspGsbER6wYJfdlUFAmmj/eoACgkQbER6wYJf dlVm8xAAnakWp6iQjuQ7WaSoMncnL1IH+NXs6eUi4g/yf1ZY/fm8Mh+4EkZm/nJp TzA+87xg8kKe+9J4pmwB92cjjPWzx10BsKj3rxVrnaQFz3VMz0SAgWaB9l8JZGZp BGKGTtzZ7Og7MrAL30AtH9V4GAZOV5F9yU/C8+u+s5X7NQ7JjypidUEsfP4MXw/T Qb27zH9vI1mpaoem7zvGnJBjpcdWCbo6SObUbtKlQ5lQXyf+HmSozC++ig97YnFK FGOS0VUHT2Uj/v2OnisQvXG6lPJ9y3pF8iH3fOSKt1E4mIdvwoQ/C72sWmcniPin t6EBxgkElDnTmfHZjGdAZcEz5tnx8s0Sb+jRHs4P0CzI2fh9NQy6fnGZ55o8AXhf jglq+M3YqXq5TQu/k1EGBbZUJwszLQndxglNwwFc7ozJI9dhoqo1p5UoRESECGmn waoCMLxnJI+QUQgQ1xvq0yRCf7pD+DADB0vAeNvi4pwB1ORdWnJ2DDZayrqcehHz JoVV1fQyqCZQLbPxhDMiALJ4xirEnl92LiZp5K8gjqvq4P4vPDWgMTmT7tpRAQqB 2q+j48flgdNu3QVmhmlpMDRcqB2sdA9UEWJvRQEUxR7kpuMXn21CvhdFs6lskaXP k1OL/ohaTdFnCh8T6+UqHJbwHTQsknfYkh8g3a4uWZBTCYE2qko= =x4Ea -----END PGP SIGNATURE-----
This policy crawled by Onyphe on the 2026-03-01 is sorted as securitytxt.
FireBounty © 2015-2026