Skip to content
Legal

Security Policy

How to report security issues responsibly.

Report a Vulnerability

Email admin@cordum.io with a clear description, impact assessment, and steps to reproduce. Do not open a public issue for security reports.

What to Include in Your Report

  • Description of the vulnerability and affected component
  • Steps to reproduce, including any proof-of-concept code
  • Impact assessment (what an attacker could achieve)
  • Your contact information for follow-up (optional but appreciated)

Response Timeline

Acknowledgement

Within 2 business days

Triage and assessment

Within 5 business days

Status updates

At least every 10 business days until resolution

In Scope
  • cordum.io website and subdomains
  • Cordum control plane source code
  • Public APIs and endpoints we operate
  • CLI tooling and published packages
Out of Scope
  • Denial of service or load testing
  • Social engineering or phishing
  • Third-party services we do not control
  • Issues already reported and under active triage

Coordinated Disclosure

We ask that you give us reasonable time to investigate and address the issue before any public disclosure. We target a 90-day disclosure window from the initial report. We will coordinate with you on timing and credit before any public advisory is issued.

Safe Harbor

We consider security research conducted in good faith and in compliance with this policy to be authorized. We will not pursue legal action against researchers who discover and report vulnerabilities responsibly, act in good faith, avoid accessing or modifying other users' data, and do not disrupt production services.

Last updated: February 2026