A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # Canonical URL Canonical: https://daxis.eu/.well-known/security.txt # Our security address Contact: https://daxis-ict.nl/meld-kwetsbaarheid/ Contact: https://daxis-ict.nl/report-vulnerability/ # Our security policy Policy: https://daxis-ict.nl/meld-kwetsbaarheid/#policy Policy: https://daxis-ict.nl/report-vulnerability/#policy # Hall of fame Acknowledgments: https://daxis-ict.nl/hall-of-fame/ # These are the languages we speak Preferred-Languages: nl,en # Our OpenPGP key Encryption: https://daxis-ict.nl/meld-kwetsbaarheid/ Encryption: https://daxis-ict.nl/report-vulnerability/ Encryption: openpgp4fpr:811100944C94E98784B291AC6C447AC1825F7655 # You shouldn't trust this file, once it has expired (like bad milk) Expires: 2025-09-02T05:20:39Z -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEgREAlEyU6YeEspGsbER6wYJfdlUFAmg9NKcACgkQbER6wYJf dlXQIg/9HO813u9koZufqZIAjMkqJhmeuXuv/L03I0F3TnyRryMTDIflMq/LLXNl is0nQZQAYMsYWIspvY4oYyLsJfMqrnUqCGJgXfQtyNzAptleNvYV0j72gTlPOlcd OP53zeYPNSiTlFtQ/30auMjrrxNpfm/pMGTKeTQ7+5n1t+xmj+XKBoGg365eeq++ qTbFM3e3VGA+PrANYSoaNQYOiVaCWTK7XNHV3uSRJv8/iBelzmlT79/9c/h/Paso cw+b9uLxMLpGoYaS/8qKHwHGSrsYQ1Svsl2ncfpoPSZe/2ehrSCYlwxYiZHpLWWi hoD110Jdqty/z88EA492aXyC7b9Y5iFFVEWl1YRdbKIYuJT+gyT/zyOWNY6VNA8k u9QgL1JVHvY9wOWxP0EVwVdu9gVl+EeU/lYhyuJnH195ZDACVWX4YMHfduDv75T/ 1JjX/5GYqBoRvhSMZ4bLYSQwusqpw24eAj5CfILIBwIJgxTsoQmD2CwjjxmWOa+O wNs5rfjoWEm/b5zkizDpWqYv+Eo1CHofAmftPWLVq35J4L0XOWTXwXHg7o//oc2f 7LsQJQ/uE5S1mzfa4zxFDzYaiZ14CZdZZiubKuuEGtNGCDY40zpMPEkfjGigNFOF gV8IMhjkY4Qt9WCwJcXLvWrKKsrf7S2WEGIA7C/XDzsWkquJsHc= =Sq7D -----END PGP SIGNATURE-----
This policy crawled by Onyphe on the 2023-10-01 is sorted as securitytxt.
FireBounty © 2015-2025