Responsible Disclosure Policy

Last updated: June 2025

Overview

At Agentic Trust, we take the security of our systems and our users' data extremely seriously. We appreciate the work of security researchers and the broader community in helping us maintain a high standard of security.

This policy outlines how to report security vulnerabilities to us in a responsible manner, and what you can expect from us in return.

Scope

This policy applies to any security vulnerabilities discovered in:

  • The Agentic Trust platform and API
  • Our official client libraries and SDKs
  • Our website and web applications
  • Our mobile applications (if applicable)
  • Any other services operated by Agentic Trust

How to Report a Vulnerability

Important:

Please report security vulnerabilities to us privately through secure channels on our website.

When reporting a vulnerability, please include:

  • A detailed description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact of the vulnerability
  • Any proof-of-concept code (if applicable)
  • Your suggested remediation (if any)

Please encrypt sensitive information when reporting vulnerabilities. PGP keys are available upon request.

Our Commitment

When you report a vulnerability to us, we commit to:

  • Acknowledge receipt of your report within 48 hours
  • Provide an initial assessment within 5 business days
  • Keep you informed about our progress
  • Credit you for the discovery (unless you prefer to remain anonymous)
  • Not pursue legal action against you if you follow this policy

Guidelines for Researchers

To ensure responsible disclosure, please:

  • Make a good faith effort to avoid privacy violations and disruptions
  • Only interact with accounts you own or with explicit permission
  • Do not access or modify user data without permission
  • Do not perform actions that could harm our services or users
  • Do not publicly disclose the vulnerability before we've addressed it
  • Do not demand compensation for reporting vulnerabilities

Out of Scope

The following issues are generally out of scope:

  • Denial of Service (DoS) attacks
  • Social engineering or phishing
  • Physical attacks against our facilities or employees
  • Issues in third-party services or libraries (unless they directly impact our security)
  • Vulnerabilities requiring unlikely user interaction
  • Recently disclosed vulnerabilities (please allow us reasonable time to patch)

Recognition

We believe in recognizing the efforts of security researchers who help us improve our security. With your permission, we may:

  • Acknowledge your contribution in our security updates
  • List your name in our security hall of fame
  • Provide a letter of appreciation

Legal Safe Harbor

We consider security research conducted in accordance with this policy to be:

  • Authorized concerning any applicable anti-hacking laws
  • Exempt from restrictions in our Terms of Service that would interfere with security research
  • Conducted in good faith

We will not initiate legal action against researchers who follow this policy. If legal action is initiated by a third party, we will take steps to make it known that your actions were conducted in compliance with this policy.

Contact Information

Response Time: Within 48 hours

Encrypted Communication: PGP key available upon request

Acknowledgments

We would like to thank the following security researchers for their responsible disclosure:

No vulnerabilities have been reported yet. Be the first to help us improve our security!