Security

Responsible Disclosure

We take security seriously. If you have discovered a vulnerability in our systems, we want to hear from you. We commit to working with you in good faith to verify, remediate, and acknowledge your finding.

Report a Vulnerability
Our Commitment

What You Can Expect

We will not pursue legal action against researchers who discover and report vulnerabilities in good faith, acting within this policy. We will treat your report as confidential and not share your identity without consent.

We offer public acknowledgement of confirmed findings to researchers who request it. We do not currently offer a paid bug bounty programme, though we may provide recognition through our public disclosure notes.

Disclosure Process

How It Works

01

Report

Submit your finding to contact@offcept.com with as much technical detail as possible. Encrypt sensitive submissions using our PGP key.

02

Acknowledgement

We will acknowledge receipt within 48 hours and assign a tracking reference. You will have a named point of contact throughout the process.

03

Assessment

Our team will validate the finding, assess severity, and determine remediation priority. We will keep you updated on our progress at least every 7 days.

04

Remediation

We will remediate confirmed vulnerabilities and notify you when the fix has been deployed. We aim to resolve critical issues within 30 days of confirmation.

05

Disclosure

We support coordinated public disclosure. If you wish to publish your findings, we ask for a minimum of 90 days from initial report to allow for remediation. We will credit researchers by name or handle, as preferred.

In Scope

What to Test

  • offcept.com and all subdomains
  • OFFCEPT web applications and APIs
  • OFFCEPT-controlled infrastructure
Out of Scope

What to Avoid

  • Social engineering attacks targeting OFFCEPT staff
  • Denial of service or resource exhaustion attacks
  • Physical security attacks
  • Automated scanning without prior coordination
  • Vulnerabilities in third-party services not under our control
  • Theoretical vulnerabilities without demonstrated impact