Responsible Disclosure Policy
Last Updated: January 16, 2026
At 5E Intel, we take the security of our platform seriously. We welcome security researchers who help us identify vulnerabilities responsibly. This policy outlines how to report security issues and what you can expect from us.
1. Scope
1.1 In-Scope Systems
The following systems and services are in scope for security testing:
- 5eintel.com - Main web application
- app.5eintel.com - Application platform (if applicable)
- api.5eintel.com - API endpoints (if applicable)
- Mobile applications (if any)
1.2 Out-of-Scope
The following are explicitly out of scope:
- Physical security testing
- Social engineering attacks against employees or customers
- Attacks against third-party services we use
- Denial of service (DoS/DDoS) attacks
- Spam or phishing campaigns
- Third-party hosted services (Stripe, email providers, etc.)
2. Rules of Engagement
When conducting security research, please adhere to the following rules:
Do
- Report vulnerabilities promptly after discovery
- Provide sufficient detail to reproduce the issue
- Make a good faith effort to avoid privacy violations and data destruction
- Only interact with accounts you own or have explicit permission to test
- Stop testing and report immediately if you access sensitive data
- Give us reasonable time to fix issues before public disclosure
Don't
- Access, modify, or delete data belonging to other users
- Execute denial of service attacks
- Send unsolicited emails to users (spam/phishing)
- Perform social engineering against staff or customers
- Use automated scanning tools that generate excessive traffic
- Publicly disclose vulnerabilities before we've had time to fix them
- Attempt to access internal systems, networks, or infrastructure
- Test on production systems during business hours without coordination
3. Reporting Process
3.1 How to Report
Please send vulnerability reports to:
Email: security@5eintel.com
Subject Line: [Security Report] Brief description of the issue
3.2 What to Include
Please include the following information in your report:
- Description: Clear description of the vulnerability
- Impact: Potential impact if exploited
- Steps to Reproduce: Detailed steps to reproduce the issue
- Proof of Concept: Screenshots, videos, or code demonstrating the vulnerability
- Environment: Browser, OS, and any relevant configuration
- Affected URL(s): Specific endpoints or pages affected
- Your Contact Info: Email address for follow-up questions
3.3 Encryption (Optional)
For sensitive reports, you may encrypt your message using our PGP key. Contact security@5eintel.com to request our public key.
4. Our Commitment
4.1 Response Timeline
| Initial Acknowledgment | Within 5 business days |
|---|---|
| Triage and Assessment | Within 10 business days |
| Status Update | Every 2 weeks until resolution |
| Resolution | Varies based on severity (typically 30-90 days) |
4.2 Safe Harbor
We commit to:
- Not initiate legal action against researchers who follow this policy
- Work with you to understand and resolve the issue quickly
- Keep you informed about the status of your report
- Credit you (if desired) when we publicly disclose the vulnerability
4.3 Credit and Recognition
We believe in recognizing the contributions of security researchers. If you'd like to be credited:
- We can acknowledge you in our security advisories (with your permission)
- We can add you to our Hall of Fame (if we create one)
- We can provide a reference letter confirming your responsible disclosure
5. What We Don't Offer
5.1 Bug Bounty
At this time, we do not offer monetary rewards for vulnerability reports. We are a small team and appreciate researchers who report issues to help make our platform more secure for everyone.
5.2 Coordinated Disclosure
We follow a coordinated disclosure model:
- We ask that you do not publicly disclose vulnerabilities until we've had reasonable time to address them
- We aim to fix critical issues within 30 days, and other issues within 90 days
- If we cannot fix an issue within the expected timeframe, we'll work with you on an appropriate disclosure timeline
- We will notify you before we publicly disclose any issue you reported
6. Qualifying Vulnerabilities
6.1 Examples of Qualifying Issues
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- SQL Injection
- Authentication or session management flaws
- Authorization bypass
- Server-Side Request Forgery (SSRF)
- Remote code execution
- Information disclosure of sensitive data
- Insecure direct object references
6.2 Non-Qualifying Issues
The following are generally not considered qualifying vulnerabilities:
- Missing HTTP security headers that don't lead to direct exploitation
- Clickjacking on pages without sensitive actions
- Self-XSS (XSS that only affects your own session)
- Rate limiting issues that don't pose a security risk
- Disclosure of non-sensitive information (software versions, etc.)
- Issues requiring physical access to a user's device
- Issues in third-party libraries without demonstrated impact
- Password policy suggestions
- Email spoofing (SPF/DKIM/DMARC) issues without demonstrated impact
- Theoretical vulnerabilities without proof of concept
7. Contact
Related Pages
- Trust & Security - Overview of our security practices
- Privacy Policy - How we handle data
Thank you for helping keep 5E Intel and our users safe. We appreciate the time and effort security researchers put into making the internet more secure.