Security Policy
At mindtwo, we take the security of our systems and customer data very seriously. We value collaboration with the security research community and appreciate reports of potential security vulnerabilities. This policy describes how you can responsibly report security issues and how we handle your reports.
Reporting Security Vulnerabilities
If you discover a security vulnerability in our systems or services, we ask you to confidentially report it to us:
Email:
PGP Encryption: Our public PGP key is available at https://www.mindtwo.nl/pgp-key.txt
Information We Need
To process your report efficiently, please provide the following information:
- Detailed description of the security vulnerability
- Steps to reproduce the issue
- Affected systems or URLs
- Potential impact of the security vulnerability
- Possible solutions (if known)
- Your contact information for follow-up questions
Our Process
After receiving your report, we will:
- Confirmation: Acknowledge receipt of your report within 48 hours
- Assessment: Analyze and evaluate the reported security vulnerability
- Communication: Keep you informed about the progress
- Remediation: Fix the confirmed security vulnerability as quickly as possible
- Publication: Publish information after resolving the issue and in consultation with you
Our Commitments
Permitted Activities
The following activities are permitted as part of security research:
Prohibited Activities
The following activities are not permitted:
Acknowledgment
We appreciate the work of security researchers and want to acknowledge their contributions. With your consent, we will include you in our Hall of Fame.
Reward Program
Currently, we do not offer a formal bug bounty program. However, we reserve the right to reward particularly valuable contributions at our discretion.
Contact
If you have any questions about this security policy, please contact
Last updated: 29.04.2025
Schedule a preliminary meeting
Arrange a non-binding and free consultation appointment and present your project to us.
