At ThreatStrike, we take the security of our systems, services, and clients very seriously. We recognize the importance of working cooperatively and transparently with security researchers, vendors, and affected parties to identify and resolve vulnerabilities in a responsible and timely manner.
This Vulnerability Disclosure Policy outlines our commitment to responsible (also known as "coordinated") disclosure. It describes the steps we take when a security issue is reported, our expectations regarding communication and timelines, and the conditions under which we make public disclosures.
We adhere to widely accepted industry standards for vulnerability disclosure. As part of our process:
While our default disclosure timeline is 90 days, we recognize that flexibility is occasionally warranted. The following exceptions may apply:
For actively exploited vulnerabilities, we strongly encourage vendors to provide interim guidance to users (e.g., temporary mitigations, configuration changes, or availability of hotfixes) even if a full patch is not yet available.
We support the Common Vulnerabilities and Exposures (CVE) system as the industry standard for identifying and cataloging publicly known cybersecurity issues. Whenever possible, we ensure that a CVE identifier is pre-assigned and included in the first public disclosure of a vulnerability, to minimize confusion and facilitate consistent communication across the industry.
If a vendor fails to acknowledge or respond to our initial contact attempts within fifteen (15) calendar days, we reserve the right to escalate the issue to the CERT Coordination Center (CERT/CC) or an equivalent national incident response organization. We do this to ensure that vulnerabilities are addressed in a timely and responsible manner, even if the vendor is initially unresponsive.
While we aim to maintain consistent treatment across all vendors and scenarios, we reserve the right to adjust the standard disclosure timeline (either shortening or extending it) based on exceptional circumstances, including but not limited to:
We strive to treat all vendors equally and without preference, and our disclosure practices are guided by the principles of fairness, user protection, and long-term improvement in the software security ecosystem.
If you have discovered a security vulnerability in a ThreatStrike-managed system, application, or asset, we encourage you to report it promptly and responsibly. Please submit your report via our secure disclosure portal:
We appreciate the efforts of independent security researchers and will engage in good faith to validate, acknowledge, and address reported vulnerabilities in accordance with this policy.
For a list of vulnerabilities disclosed by ThreatStrike researchers, including links to published CVEs and technical advisories, please refer to:
ThreatStrike Vulnerability Advisories
Thank you for helping us improve the safety and security of the digital ecosystem.