0%
NEURAL_LINK_ESTABLISHED
Initializing_System_Cortex.sh --run
BACK_TO_SYSTEM
CortexEDR Logo

Security Disclosure

Vulnerability Disclosure Policy // VDP 1.0

CortexEDR values the contribution of the security research community. If you have discovered a potential security vulnerability, we invite you to report it through our disclosure process.

Guidelines for Researchers

To maintain a collaborative and responsible disclosure environment, we request that researchers:

  • 01.Notify us immediately upon discovery of a potential vulnerability.
  • 02.Provide detailed reproduction steps to facilitate rapid triage and mitigation.
  • 03.Avoid any action that could degrade platform performance or result in data exfiltration.
  • 04.Maintain confidentiality until a fix has been deployed and validated.

Reporting Process

Please submit all security findings to **security@cortex-edr.sys**. To facilitate rapid triage, your report should include:

  • Impacted system node, API endpoint, or architectural component.
  • Technical classification (e.g., RCE, SQLi, Auth Bypass, IDOR).
  • Deterministic reproduction steps and a Proof-of-Concept (PoC).
  • Potential impact assessment on platform integrity or user data.

Operational Service Level Objectives (SLOs)

CortexEDR maintains a high-priority incident response pipeline for security disclosures:

Acknowledge
< 12 Hours
Technical Triage
< 48 Hours
Resolution Goal
SLA Dependent

Researcher Safe Harbor

CortexEDR will not pursue legal action against researchers who comply with this policy. We consider activities conducted under these guidelines to be "authorized" access under the Computer Fraud and Abuse Act (CFAA) and other relevant anti-hacking laws.

Express Exclusions

The following activities are strictly prohibited and fall outside the scope of Safe Harbor:

  • Destructive testing or Denial of Service (DoS/DDoS) attempts.
  • Social engineering, phishing, or physical security breaches.
  • Accessing, modifying, or retaining any data that does not belong to you.