Skip to main content
TRUST CENTER

Security & Trust Center

Our security posture, disclosure policies, and contact channels for vulnerability reports.

VULNERABILITY DISCLOSURE POLICY

We operate a coordinated vulnerability disclosure program. Security researchers are encouraged to report vulnerabilities responsibly. We will acknowledge receipt within 24 hours and provide an initial assessment within 72 hours.

We do not pursue legal action against researchers who report vulnerabilities in good faith and comply with this policy. We request a 90-day disclosure window from the initial report date.

VULNERABILITY DISCLOSURE PROGRAM (VDP)

Our Vulnerability Disclosure Program (VDP) invites security researchers to report vulnerabilities in good faith. We do not offer monetary rewards; we acknowledge contributors in our security hall of fame and work with you to remediate issues before any public disclosure.

Reports are triaged by severity. We follow coordinated disclosure and provide clear response timelines.

SEVERITYTARGET RESPONSESCOPE
CRITICAL< 24 hoursRCE, Auth Bypass, Data Exfil
HIGH< 48 hoursXSS, SSRF, Priv Escalation
MEDIUM< 5 daysCSRF, Info Disclosure
LOW< 10 daysMisconfig, Rate Limiting

PGP PUBLIC KEY

Use this key to encrypt sensitive communications. All vulnerability reports should be encrypted when containing exploit details or proof-of-concept code.

FINGERPRINT4A2B 7C9E 1D3F 8A6B 5E0C 2D9F 7B1A 3E8C 6F4D 0A5B
KEY ID0x7B1A3E8C6F4D0A5B

INFRASTRUCTURE SECURITY

All lab environments run in fully isolated virtual machines with strict network segmentation. Ephemeral instances are destroyed after each session. Zero-trust networking enforced at every boundary.

ENCRYPTION AT RESTAES-256-GCM
ENCRYPTION IN TRANSITTLS 1.3
KEY MANAGEMENTHSM-backed (FIPS 140-2 L3)
DATA RESIDENCYEU (Frankfurt), US (Virginia)
SOC COMPLIANCESOC 2 Type II (in progress)
PENETRATION TESTINGQuarterly (external)
SECURITY CONTACTsecurity@duckurity.com
*RESPONSE: < 24 hours