Vulnerability Disclosure Policy

1. Introduction

Website Wannabe is committed to maintaining the security and privacy of our systems, products, and services. This Vulnerability Disclosure Policy outlines how security researchers and the public can report potential security vulnerabilities responsibly.


 

2. Scope

This policy applies to all digital assets owned, operated, or maintained by Website Wannabe, including:

  • Websites

  • Web applications

  • APIs

  • Network Infrastructure

  • Software products: AI Agents, Automation Agents, etc

This policy does not authorize security testing or research without prior consent.

 


 

3. Reporting a Vulnerability

If you identify a security vulnerability, please report it promptly to [email protected]. Your report should include:

  • A detailed description of the vulnerability

  • Steps to reproduce the issue

  • Any potential impact the vulnerability may cause

  • Your contact information (optional but encouraged)

Reports should be made in good faith and should not include any attempts to exploit the vulnerability.

 


 

4. Responsible Disclosure Guidelines

We ask that reporters:

  • Avoid exploiting the vulnerability beyond what is necessary to verify its existence.

  • Do not publicly disclose the vulnerability until we have resolved it or provided guidance.

  • Allow us a reasonable time to investigate and address the issue before disclosure.

We commit to:

  • Acknowledging receipt of your report within [X] business days.

  • Providing updates on our progress as we investigate and remediate the vulnerability.

  • Recognizing researchers who make valuable contributions (if permitted by the reporter).


 

5. Prohibited Activities

The following activities are strictly prohibited:

  • Unauthorized access to data, systems, or networks.

  • Disrupting or degrading services (e.g., DoS attacks).

  • Social engineering, phishing, or impersonation.

  • Physical security testing (e.g., facility access attempts).

  • Public disclosure of vulnerabilities without prior coordination.

Violations of this policy may result in legal action.

 


 

6. Safe Harbor

We value security researchers and ethical hackers who report vulnerabilities in good faith. If you comply with this policy, we will not pursue legal action against you for security research conducted within the scope of this policy.

 


 

7. Updates to This Policy

We may update this policy periodically to reflect changes in security practices. Updates will be communicated through our website.

 


 

8. Contact Information

For security vulnerability reports or related inquiries, please contact:

COMING SOON: Product Videos!