Last updated: 21 juin 2025
This Policy applies exclusively to BlueSphere Security Ltd's independent security research. It does not govern confidential penetration testing engagements conducted under a Customer Agreement, which are separate and subject to distinct contractual obligations.
I. Purpose
BlueSphere Security Ltd ("BlueSphere") and its security team regularly conduct independent research into the security of widely used applications, systems, and services. This research is carried out to protect end users and improve the overall security posture of the digital ecosystem.
BlueSphere recognises that responsible disclosure must strike a balance between allowing vendors sufficient time to remediate vulnerabilities and ensuring that end users are not left exposed. This Vulnerability Disclosure Policy ("Policy") defines the process by which BlueSphere discloses security vulnerabilities to product and service vendors, and when applicable, to the general public.
II. Scope
This Policy applies to all security vulnerabilities discovered by BlueSphere during its independent research activities, including but not limited to:
This Policy does not apply to findings arising from contractual penetration testing engagements with BlueSphere customers. Those findings are handled exclusively under the relevant Customer Agreement and applicable confidentiality obligations.
III. Disclosure Process & Timelines
Upon identifying a security vulnerability, BlueSphere follows the structured disclosure process below:
IV. Extensions & Exceptional Circumstances
BlueSphere acknowledges that some vulnerabilities may require more than 20 days to remediate due to complexity, dependency chains, or compatibility constraints. Extensions may be granted on a case-by-case basis.
In the interest of transparency, if any extension is granted, BlueSphere will publish the full communication history with the vendor at the time of eventual public disclosure. This allows the security community to understand the remediation challenges vendors face when addressing high-impact vulnerabilities.
V. Immediate Public Disclosure
In circumstances where BlueSphere determines that a vulnerability poses an immediate and significant risk to the safety of end users — including active exploitation in the wild, critical infrastructure exposure, or mass data leakage — BlueSphere reserves the right to notify the vendor and the general public simultaneously.
In all cases of immediate disclosure, BlueSphere will provide the vendor with a written explanation of the factors that led to this decision.
Immediate disclosure is reserved for exceptional circumstances only. BlueSphere will always endeavour to act in the best interest of end users and to give vendors a fair opportunity to respond.
VI. Vendor Collaboration
BlueSphere is committed to working constructively with vendors throughout the disclosure process. This includes:
If a vendor is unable or unwilling to patch a vulnerability, BlueSphere may offer to work with that vendor to publicly disclose the flaw alongside effective workarounds to protect end users.
VII. Contact