laet4x.com
Disclosure Policy
This policy defines the rules of engagement, scope, and disclosure process for Vanguard VDP. All researchers must read and agree to this policy before submitting a report.
Program Overview
The Vanguard VDP is our commitment to working collaboratively with the global security research community. We welcome good-faith reports of security vulnerabilities affecting laet4x.com and its associated infrastructure.
Valid reports receive acknowledgment within 48 hours and a triage decision within 7 business days. Researchers who identify and responsibly disclose qualifying vulnerabilities are eligible for public recognition on our Hall of Fame.
Scope
In Scope
- ✓vanguard.laet4x.com
- ✓laet4x.com
Out of Scope
The following will not be accepted as valid vulnerability reports:
- Phishing, smishing, or social engineering attacks
- Physical security issues
- Denial of Service (DoS/DDoS) attacks or testing
- Vulnerabilities in third-party services not under our control
- UI/UX issues, typos, or cosmetic bugs without security impact
- Informational findings (e.g. banner disclosure, missing headers) with no demonstrated exploitability
- Best practice recommendations without a proof-of-concept demonstrating real risk
- Self-XSS or attacks requiring physical device access
- Rate limiting issues without demonstrated business impact
- Theoretical vulnerabilities that cannot be reproduced
What to Include in a Report
Incomplete reports may be closed without triage. High-quality submissions are reviewed faster. Please include:
- Vulnerability type — e.g. XSS, IDOR, SQL Injection, SSRF, authentication bypass
- Affected asset — URL, endpoint, parameter, or component
- Severity assessment — your estimated impact (Critical / High / Medium / Low)
- Steps to reproduce — clear, step-by-step instructions
- Proof of concept — screenshots, HTTP request/response logs, or PoC code
- Impact statement — what an attacker could achieve by exploiting this issue
- Suggested remediation (optional but appreciated)
Disclosure Process
Submit
Sign in and submit your report through the platform with full reproduction details.
Triage
Our security team reviews, validates, and assigns a severity rating within 7 business days.
Remediation
We develop and test a fix. We may request clarification or invite collaboration on the patch.
Resolution
Once resolved, we close the report and update its status. Qualifying researchers are added to the Hall of Fame.
Rules of Engagement & Safe Harbor
Researcher Obligations
- Only test against assets explicitly listed in scope
- Do not access, exfiltrate, modify, or destroy data belonging to others
- Do not disrupt production services or degrade availability
- Do not publicly disclose findings before we have had the opportunity to remediate
- Act in good faith — no extortion, threats, or demands
- Comply with all applicable laws throughout your research
Our Commitment to Researchers
- We will not pursue legal action against researchers who comply with this policy
- We will respond to all valid reports within 48 hours of receipt
- We will keep you informed of triage and remediation progress
- We will recognize qualifying researchers publicly in our Hall of Fame
- We will coordinate disclosure timing with you in good faith
