Responsible Disclosure Policy

Last updated: 2026-04-11

Backbuild welcomes reports from the security research community. We believe that working openly with researchers makes our products safer for everyone. This policy describes what is in scope, how to report a vulnerability, what you can expect from us, and the safe harbor we extend to good-faith researchers who follow these rules.

Scope

In scope

Out of scope

Reporting process

  1. Email with the subject line VULNERABILITY REPORT.
  2. Include a clear description of the issue, the affected endpoint or component, and reproduction steps.
  3. Attach proof-of-concept material (screenshots, request captures, minimal exploit code) where possible.
  4. Tell us your preferred credit name, or request anonymity.
  5. Do not publicly disclose the issue until we have confirmed a fix and agreed on a disclosure timeline.

For sensitive reports, you may encrypt your message with our PGP key. A public key is available on request from and will be published at /.well-known/pgp-key.txt in a future update.

-----BEGIN PGP PUBLIC KEY BLOCK-----
[Placeholder — contact the security team for the current key]
-----END PGP PUBLIC KEY BLOCK-----

What you can expect from us

MilestoneTarget
Acknowledge receiptWithin 1 business day
Triage and severity assignmentWithin 3 business days
Remediation plan communicatedWithin 7 business days
Critical severity fix deployedWithin 7 days of confirmation
High severity fix deployedWithin 30 days of confirmation
Medium severity fix deployedWithin 90 days of confirmation
Public disclosure (coordinated)After fix is deployed and validated

Safe harbor

Backbuild will not pursue or support legal action against security researchers who:

We consider research conducted under this policy to be authorized access under the U.S. Computer Fraud and Abuse Act and similar laws. If legal action is initiated by a third party against you for activity that complies with this policy, we will make this authorization known.

Recognition

We maintain a hall of fame for researchers who have reported valid vulnerabilities. If you would like to be listed, include your preferred display name in your report. Backbuild does not currently operate a paid bug bounty program, but we are evaluating one for a future launch.

Report a vulnerability

Email:
Subject: VULNERABILITY REPORT
PGP: Available on request