Vulnerability Disclosure Policy
Claresia commits to the following when a security researcher reports a vulnerability in good faith:
- We will acknowledge receipt within 24 hours (business days).
- We will triage and assign a severity within 7 days.
- We will keep you informed of remediation progress and timeline.
- We will not pursue legal action against good-faith research that adheres to this policy.
- We will credit you publicly on this page (with your consent) when the issue is resolved.
Safe harbor
Activities conducted in good faith and consistent with this policy are authorised. Claresia will not pursue or support any legal action related to your research, will work with you to understand and resolve the issue quickly, and considers your activity authorised under the Computer Fraud and Abuse Act, the Digital Millennium Copyright Act, and applicable foreign-law equivalents.
Reward ranges (effective at Q3 2026 program launch)
| Severity | Reward range | Examples |
| Critical | $5,000 – $15,000 | Customer-data exfiltration, account takeover at scale, privilege escalation across tenants. |
| High | $1,500 – $5,000 | Single-tenant data exposure, authentication bypass, persistent stored XSS in admin surface. |
| Medium | $500 – $1,500 | Reflected XSS, CSRF on sensitive endpoints, sensitive information disclosure. |
| Low | $100 – $500 | Configuration weaknesses, security-relevant rate limits, low-impact misconfigurations. |
Until the public program launches, qualifying reports submitted to vdp@claresia.com will be eligible retroactively for these rewards.