Vulnerability Disclosure Policy

Last updated:

ClearWorks Foundry Inc. welcomes reports of security vulnerabilities affecting our website and services. This policy describes what is in scope, how to report, and what to expect from us.

Scope

In scope:

Out of scope:

How to report

Send reports to security@clearworks.ca. Please include:

  1. A description of the vulnerability and its impact.
  2. Clear reproduction steps, including any proof-of-concept code, payloads, or HTTP requests.
  3. The affected URL or component.
  4. Your preferred name or handle for credit (or let us know you prefer anonymity).

What to expect from us

Safe harbour

We consider good-faith security research conducted under this policy to be authorized. We will not pursue legal action, or support law-enforcement investigation, against researchers who:

If you discover personal data during your research, stop immediately and include the details in your report. Do not retain it.

Coordinated disclosure

We ask that you give us a reasonable window to fix reported vulnerabilities before publishing details. Our default is 90 days from acknowledgement, extensible by mutual agreement for complex issues. If a fix ships sooner, you are welcome to publish immediately.

Bounty

ClearWorks does not currently offer a monetary bug bounty. We offer our gratitude, credit if you wish to be named, and direct communication with an engineer who actually fixes the thing.

Policy changes

This policy may change over time. This page is authoritative. The current version is referenced by our security.txt.

Contact

Questions about this policy or a disclosure in progress? Email security@clearworks.ca.