Responsible Disclosure
Effective: 2026-04-22 · Version 1.0
Securie runs a public responsible-disclosure program. Security researchers who report vulnerabilities in good faith are welcome, and we commit to treating every report with the seriousness it deserves.
How to report
Email security@securie.ai with:
- A description of the vulnerability and its impact.
- Steps to reproduce (code snippets, HTTP requests, etc.).
- Any proof-of-concept artifacts.
For sensitive reports, encrypt with our PGP key at /.well-known/securie-pgp.asc.
Our commitments
- Acknowledge within 24 hours of receipt.
- Triage verdict within 5 business days (accepted, duplicate, informational, or rejected with reasoning).
- Fix within 30 days for high + critical; 90 days for medium; best-effort for low / informational.
- Coordinated disclosure: we credit you publicly (optional) and publish advisory + CVE when the fix ships.
Safe harbor
Good-faith security research against Securie's own surfaces is authorized. We will not pursue legal action for:
- Testing against your own Securie-installed repositories.
- Non-destructive proof-of-concepts that do not access other tenants' data.
- Reporting through the channels above without prior public disclosure.
Out of scope
- DoS / resource-exhaustion attacks against production services.
- Social engineering of Securie employees or customers.
- Vulnerabilities in third-party services we depend on — report those upstream.
- Findings requiring physical access to our infrastructure.
Bug-bounty rewards
Rewards are discretionary and scale with severity + quality of report. Range: $250 (low) – $10,000 (critical-unique). Duplicate reports go to the first substantive submitter.