A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # Canonical URL Canonical: https://rijssen.eu/.well-known/security.txt # Our security address Contact: https://daxis-ict.nl/meld-kwetsbaarheid/ Contact: https://daxis-ict.nl/report-vulnerability/ # Our security policy Policy: https://daxis-ict.nl/meld-kwetsbaarheid/#policy Policy: https://daxis-ict.nl/report-vulnerability/#policy # Hall of fame Acknowledgments: https://daxis-ict.nl/hall-of-fame/ # These are the languages we speak Preferred-Languages: nl,en # Our OpenPGP key Encryption: https://daxis-ict.nl/meld-kwetsbaarheid/ Encryption: https://daxis-ict.nl/report-vulnerability/ Encryption: openpgp4fpr:811100944C94E98784B291AC6C447AC1825F7655 # You shouldn't trust this file, once it has expired (like bad milk) Expires: 2026-06-01T07:50:45Z -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEgREAlEyU6YeEspGsbER6wYJfdlUFAmmj/eUACgkQbER6wYJf dlWeLg/+OO9yIeGCUlucg4803RLoHKpojE5Y1+UXVe5+mubim8Vre28r0mXVI1uF 4Tizpqnt40NPLDsUXdvaKcY9n8EZIow4+P/YFx6BwOu0av9x7BONTUW5wqVv0L9i MS+ik0544FUOXl+Jm0p89uCZcWzAIXiq3EcPNq+ZKo67+foQglQ9hzR259QsGrem qmEpv0Xxd1QHX1mvaLMheOdQiZd7UIUgOB9SdHi+eks4PABBeByndUJfHmyrAcZN 3YvQVjWcGWiy8q0v8+4rCxxgEW33GT+ywacj8K+PwD+h2mh6Gok5tC1BvyH4eO1i nO1Wi1ky9Iq61k6vcxyNYRcOw3qqQvQBK5455WArRsnAcEDvq85tPz5WrQBYkqxK s5Zb/NZ5l+6e+ACqTrmKiKH7/FumOPBjcuoDf1phWMrVbXucPdsbr7xmVyhlsf4g yii5CMbW9SzHxh2fzIP3dAbyNz+419GFAt0zwB5oLn+MvwcMPt/zn7FPo570pmrH s8qRHCn5N4+IBmsAdLoRfzyfYX7RMWVUMg0Nx7GP+WAaopnPmTlf8DzTRSqnhUtJ txPr8xpavdIFNxYWw5YOMzjcfjAAJOTQ4X9ZjfEJ9T/JunDElcb/cHUjbAjI9Wvf jan0woFMakSZ6YesZDki3IV8lfNcKVMa5L9oFMKSUUO1gYSJurI= =moBN -----END PGP SIGNATURE-----
This policy crawled by Onyphe on the 2026-03-01 is sorted as securitytxt.
FireBounty © 2015-2026