Security Policy

Guidelines for responsible security vulnerability reporting and my commitment to protecting your data.

Building secure systems through community collaboration

Responsible Security Reporting

I will investigate legitimate reports and make every effort to quickly resolve any vulnerability. To encourage responsible reporting, I will not take legal action against you nor ask law enforcement to investigate you providing you comply with the following guideline:

Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of my services.

How to Report Security Issues

What to Include in Your Report

Required Information

  • Description of the vulnerability
  • Steps to reproduce the issue
  • Affected URL or system component
  • Your contact information

Additional Details (Helpful)

  • Severity assessment
  • Potential impact description
  • Screenshots or proof of concept
  • Suggested remediation steps

My Response Process

1

Acknowledgment

I'll confirm receipt of your report within 24 hours

2

Investigation

I will assess and reproduce the issue

3

Resolution

I'll develop and implement a fix

4

Follow-up

I'll notify you when the issue is resolved

My Security Commitment

Technical Safeguards

  • • HTTPS encryption for all communications
  • • Regular security updates and patches
  • • Secure coding practices and code reviews
  • • Regular backup and disaster recovery procedures
  • • Access controls and authentication protocols

Operational Security

  • • Staff security training and awareness
  • • Incident response and monitoring
  • • Third-party security assessments
  • • Compliance with industry standards
  • • Regular security audits and testing

Activities I Don't Allow

While I encourage responsible security research, the following activities are not permitted:

  • • Accessing, modifying, or deleting data that doesn't belong to you
  • • Performing denial of service attacks or load testing
  • • Social engineering attacks against my staff or customers
  • • Physical attacks against my facilities or equipment
  • • Running automated vulnerability scanners without permission
  • • Testing on production systems that could affect service availability

Security Researcher Recognition

I appreciate the security research community and recognize responsible researchers who help me improve my security posture. Depending on the severity and impact of the vulnerability:

  • • Public acknowledgment on my website (with your permission)
  • • Direct communication with my technical team
  • • Coordination on disclosure timeline
  • • Consideration for future security consulting opportunities

Security Questions or Concerns?

I take security seriously and am here to address any concerns or questions you may have.

Security Vulnerabilities

Report security issues responsibly

Contact

General Security Questions

Questions about my security practices

Contact

Account Security

Issues with your account access

Contact