File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ ==================
2+ Security Policy
3+ ==================
4+
5+ **xyz.com | ©xyz | 2025 **
6+
7+ ----
8+
9+ Reporting a Vulnerability
10+ ==========================
11+
12+ We at XYZ take the security of our services and products very seriously.
13+
14+ If you believe you have found a security vulnerability in any of our projects or services,
15+ please report it to us as soon as possible.
16+
17+ How to Report
18+ -------------
19+
20+ Please send a detailed report to our dedicated security email address:
21+
22+ **security@xyz.com **
23+
24+ What to Include in Your Report
25+ -------------------------------
26+
27+ To help us quickly understand, reproduce, and resolve the issue, please include as much
28+ detail as possible in your report:
29+
30+ - A clear description of the vulnerability
31+ - Steps to reproduce the issue
32+ - Potential impact of the vulnerability
33+ - Any suggested fixes (if applicable)
34+
35+ Response Timeline
36+ -----------------
37+
38+ - We will acknowledge receipt of your report within 48 hours
39+ - We will provide a detailed response within 7 days
40+ - We will keep you informed of our progress
41+
42+ Thank You
43+ ---------
44+
45+ We appreciate your efforts to responsibly disclose your findings and will make every
46+ effort to acknowledge your contributions.
You can’t perform that action at this time.
0 commit comments