Skip to content

Security: MrArnaudMichel/AIctron

SECURITY.md

Security Policy

Reporting a Vulnerability

At AIctron, we take security seriously. If you believe you've found a security vulnerability in our code or systems, please help us by responsibly disclosing the issue to us. We will investigate and take appropriate action to address it as soon as possible.

To report a security vulnerability, please email us directly at security@aictron.fr and provide detailed information about the vulnerability, including:

  • Description of the vulnerability.
  • Steps to reproduce the vulnerability.
  • Any proof-of-concept or exploit code, if applicable.

We encourage you to use our PGP key to encrypt any sensitive information you include in your report. You can find our PGP key on our website or public key servers.

Supported Versions

Version Supported
1.0
<1.0.x

Vulnerability Disclosure Process

Once we receive your report, we will acknowledge receipt of the report within [X business days]. Our team will then evaluate the report to verify the vulnerability and determine the impact and severity. We may reach out to you for additional information or clarification during this process.

After verifying the vulnerability, we will work to develop and test a fix. Once a fix is ready, we will release a security update as soon as possible. We will coordinate with you to ensure that proper credit is given for the discovery of the vulnerability.

Bug Bounty Program

We do not currently offer a bug bounty program for vulnerabilities discovered in our code or systems. However, we greatly appreciate and acknowledge the efforts of security researchers who help us improve the security of our software.

Responsible Disclosure Guidelines

When reporting vulnerabilities, please follow these guidelines:

  • Provide detailed information about the vulnerability, including steps to reproduce.
  • Do not disclose the vulnerability publicly until we have had a chance to investigate and address it.
  • Do not exploit the vulnerability to access or modify data that does not belong to you.
  • Do not engage in any activity that could harm the reliability, availability, or integrity of our systems.

Additional Information

While we make every effort to address security vulnerabilities in a timely manner, please note that our response and resolution times may vary depending on the complexity and severity of the issue. We appreciate your patience and cooperation as we work to ensure the security of our software.

Thank you for helping us keep AIctron safe and secure.

AIctron Security Team

There aren’t any published security advisories