Responsible Disclosure Policy
At Team Blaeu, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present.
If you discover a vulnerability, we would like to know about it to take steps to address it as quickly as possible. We want to ask you to help us better protect our clients and our systems.
Please do the following
- E-mail your findings to rob@blaeu.com . Encrypt your results using our PGP key to prevent this critical information from falling into the wrong hands.
- Do not take advantage of the vulnerability or problem you have discovered, for example, by downloading more data than necessary to demonstrate the vulnerability or deleting or modifying other people's data.
- Do not reveal the problem to others until we have resolved it.
- Do not use attacks on physical security, social engineering, distributed denial of service, spam or applications of third parties.
- Do provide sufficient information to reproduce the problem to resolve it as quickly as possible. Usually, the IP address or the URL of the affected system and a description of the vulnerability will be sufficient, but complex vulnerabilities may require further explanation.
Not eligible for a reward
- Missing HTTP security headers, unless they directly enable an attack.
- Version number or software configuration disclosure without a demonstrable exploit.
- Weak TLS or cipher configurations without a working proof of concept.
- Clickjacking without demonstrated security impact.
- Known vulnerable libraries or components without a proof of concept specific to our implementation.
- Reports consisting solely of automated scanning tool output, without manual verification and a working proof of concept.
- Reports generated solely by AI.
- Theoretical issues, hardening recommendations, and best-practice configurations without demonstrable risk.
- Findings we have reviewed and classified as accepted risk.
- Duplicate findings — only the first reporter of a unique vulnerability is eligible for a reward.
- Social engineering, phishing, spam or denial-of-service attacks.
- Vulnerabilities in third-party services not managed by us.
What we promise
- We will respond to your report within three business days with our evaluation of the information and an expected resolution date.
- If you have followed the instructions above, we will not take any legal action against you regarding the information.
- We will handle your report with strict confidentiality and not pass on your details to third parties without your permission.
- We will keep you informed of the progress towards resolving the problem.
- In the public information concerning the problem reported, we will give your name as the discoverer of the problem (unless you desire otherwise).
- We offer a reward for every unique, first-reported security problem not previously known to us that meets the above conditions. The reward is based on severity (CVSS score) and report quality, with a minimum of a €50 gift voucher via the Giftogram Global Rewards programme. Low-severity and informational findings are not eligible. Where the same vulnerability is reported by multiple researchers, only the first reporter is eligible. The final determination of severity and reward rests with us.
We strive to resolve all problems as quickly as possible, and we would like to play an active role in the ultimate publication of the issue after fixing it.
If there is an inconsistency between the Dutch and English-language version of these regulations, the Dutch version takes precedence.
To report a vulnerability, contact rob@blaeu.com .