176669 policies in database
Link to program      
2026-03-02
crackadat.com logo
Thank
Gift
HOF
Reward

crackadat.com

A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.

# Crack the ADAT Security Policy
# RFC 9116 Compliant Security.txt
# https://securitytxt.org/

# Contact information for security researchers
Contact: mailto:security@crackadat.com
Contact: mailto:admin@crackADAT.com

# PGP key for encrypted communications (optional)
# Encryption: https://crackadat.com/.well-known/pgp-key.txt

# Preferred languages for security reports
Preferred-Languages: en

# Canonical URL for this security.txt file
Canonical: https://crackadat.com/.well-known/security.txt

# Policy page (if available)
# Policy: https://crackadat.com/security-policy

# Acknowledgments page for security researchers
# Acknowledgments: https://crackadat.com/security-thanks

# Expiration date for this file (must be updated annually)
Expires: 2025-12-31T23:59:59.000Z

# Hiring information (optional)
# Hiring: https://crackadat.com/careers

# ═══════════════════════════════════════════════════════════════════
# SECURITY DISCLOSURE GUIDELINES
# ═══════════════════════════════════════════════════════════════════
#
# Thank you for helping keep Crack the ADAT and our users safe!
#
# Scope:
# - crackadat.com and all subdomains
# - Our web and mobile applications
# - Our API endpoints
#
# Out of Scope:
# - Third-party services (Stripe, PayPal, Vimeo, etc.)
# - Social engineering attacks
# - Physical security assessments
# - Denial of service attacks
#
# Responsible Disclosure:
# - Please allow up to 90 days for remediation
# - Do not access or modify user data
# - Do not disrupt service availability
# - Do not publicly disclose vulnerabilities before remediation
#
# We appreciate security researchers who:
# - Provide detailed reports with steps to reproduce
# - Allow reasonable time for remediation
# - Act in good faith to protect our users
#
# ═══════════════════════════════════════════════════════════════════

This policy crawled by Onyphe on the 2026-03-02 is sorted as securitytxt.

FireBounty © 2015-2026

Legal notices | Privacy policy