🔐 Security Contact & Responsible Disclosure

Last Updated:
← Back

Table of Contents

Security First: InkDecoder is committed to maintaining the highest security standards for our document transcription service. We welcome responsible security research and work collaboratively with the security community to protect our users.

1. Security Program Overview

InkDecoder takes security seriously and has established a comprehensive security program to protect our users' data and maintain service integrity. Our security efforts focus on:

Our Commitment: We are dedicated to working with security researchers to identify and resolve potential vulnerabilities before they can impact our users.

2. Security Contact Information

Primary Security Contact

  • Email: security@inkdecoder.com
  • Subject Line Format: [SECURITY] Vulnerability Report - [Brief Description]
  • Response Time: Within 24 hours for initial acknowledgment
  • Business Hours: Monday-Friday, 9 AM - 5 PM EST

Security Team Lead

  • Role: Chief Security Officer
  • Email: cso@inkdecoder.com
  • Use for: Escalations, policy questions, partnership discussions

🚨 Emergency Security Hotline

For critical security incidents requiring immediate attention:

  • Email: emergency-security@inkdecoder.com
  • Subject: [CRITICAL SECURITY INCIDENT]
  • Response: 2-4 hours, 24/7 monitoring
  • Use for: Active attacks, data breaches, critical vulnerabilities

2.1 Alternative Contact Methods

3. Responsible Disclosure Policy

InkDecoder follows industry best practices for responsible disclosure and encourages security researchers to report vulnerabilities through our coordinated disclosure process.

3.1 Our Commitment to Researchers

We Promise:
  • Prompt acknowledgment and investigation of reports
  • Regular updates on remediation progress
  • Credit and recognition for valid findings
  • No legal action against good-faith security research
  • Coordination on public disclosure timing

3.2 Researcher Expectations

We ask security researchers to:

3.3 Coordinated Disclosure Timeline

Day 0: Vulnerability reported to InkDecoder security team
Day 1: Initial acknowledgment and triage
Day 7: Assessment completion and remediation plan
Day 30-90: Fix development and deployment (varies by severity)
Post-Fix: Coordinated public disclosure discussion

4. Vulnerability Reporting Process

1

Initial Report Submission

Send a detailed vulnerability report to security@inkdecoder.com including:

  • Clear description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact assessment
  • Proof of concept (if applicable)
  • Suggested remediation steps
  • Your contact information for follow-up
2

Report Acknowledgment

You will receive an acknowledgment within 24 hours containing:

  • Unique tracking identifier
  • Initial assessment of report validity
  • Next steps in the investigation process
  • Point of contact for ongoing communication
3

Vulnerability Assessment

Our security team will:

  • Reproduce and validate the vulnerability
  • Assess severity and potential impact
  • Determine affected systems and components
  • Develop remediation strategy
  • Provide regular status updates
4

Remediation and Resolution

Based on severity, we will:

  • Implement appropriate fixes or mitigations
  • Test remediation thoroughly
  • Deploy fixes to production systems
  • Verify vulnerability resolution
  • Document lessons learned
5

Disclosure and Recognition

After remediation:

  • Coordinate public disclosure timing
  • Provide researcher recognition (if desired)
  • Share technical details of the fix
  • Update security documentation
  • Implement additional preventive measures

5. Vulnerability Severity Classification

We use the Common Vulnerability Scoring System (CVSS) v3.1 to classify vulnerability severity:

5.1 Critical Severity 9.0-10.0

Examples:
  • Remote code execution without authentication
  • Complete system compromise
  • Massive data exposure or breach
  • Authentication bypass affecting all users
Response Time: 4 hours acknowledgment, 72 hours for initial fix

5.2 High Severity 7.0-8.9

Examples:
  • SQL injection with data access
  • Privilege escalation vulnerabilities
  • Unauthorized data access
  • Cross-site scripting affecting sensitive operations
Response Time: 24 hours acknowledgment, 7 days for initial fix

5.3 Medium Severity 4.0-6.9

Examples:
  • Cross-site request forgery
  • Information disclosure
  • Denial of service vulnerabilities
  • Insecure direct object references
Response Time: 48 hours acknowledgment, 30 days for fix

5.4 Low Severity 0.1-3.9

Examples:
  • Minor information leakage
  • Security misconfigurations
  • Low-impact denial of service
  • Missing security headers
Response Time: 5 business days acknowledgment, 90 days for fix

6. Response Timeline and Process

6.1 Response Time Commitments

Our response times are based on vulnerability severity:

Severity Acknowledgment Assessment Initial Fix
Critical 4 hours 24 hours 72 hours
High 24 hours 3 days 7 days
Medium 48 hours 7 days 30 days
Low 5 business days 14 days 90 days

6.2 Communication During Response

Throughout the process, we provide:

6.3 Escalation Process

If response times are not met or you need to escalate:

  1. Contact the Security Team Lead at cso@inkdecoder.com
  2. Include original report tracking ID and timeline concerns
  3. For critical issues, use emergency contact: emergency-security@inkdecoder.com
  4. As a last resort, contact our legal team at legal@inkdecoder.com

7. Security Research Scope

7.1 In-Scope Systems and Services

Authorized Testing Targets:
  • InkDecoder web application (*.inkdecoder.com)
  • Public API endpoints
  • Authentication and session management
  • Document upload and processing functionality
  • Payment processing integration
  • Account management features

7.2 Out-of-Scope Systems

Do NOT Test:
  • Third-party services (OpenAI, Stripe, cloud providers)
  • Social engineering against employees
  • Physical security of offices or data centers
  • Denial of service attacks
  • Testing that affects other users' data or service availability
  • Brute force attacks against authentication

7.3 Testing Guidelines

When conducting security research:

7.4 Prohibited Activities

9. Security Researcher Recognition

9.1 Hall of Fame

We maintain a security researcher hall of fame to recognize contributors:

9.2 Recognition Criteria

Researchers may receive recognition for:

9.3 Anonymity Options

We respect researcher preferences regarding public recognition:

10. Secure Communication

10.1 Encrypted Email Communication

For sensitive vulnerability reports, we support encrypted communication:

PGP Encryption:
  • Email: security@inkdecoder.com
  • Key ID: 0x1234567890ABCDEF
  • Fingerprint: 1234 5678 90AB CDEF 1234 5678 90AB CDEF 1234 5678
-----BEGIN PGP PUBLIC KEY BLOCK----- [Example PGP public key would be inserted here] This is a placeholder for the actual PGP public key Contact security@inkdecoder.com for the current key -----END PGP PUBLIC KEY BLOCK-----

10.2 Secure File Transfer

For large files or sensitive proof-of-concepts:

10.3 Signal/Secure Messaging

For real-time communication during critical incidents:

11. Emergency Security Contacts

🚨 Critical Security Incidents

For vulnerabilities requiring immediate attention:

  • Email: emergency-security@inkdecoder.com
  • Subject: [CRITICAL] Brief vulnerability description
  • Monitoring: 24/7 monitoring and alerting
  • Response: 2-4 hours maximum
Use emergency contacts for:
  • Active attacks or exploitation in progress
  • Data breaches or unauthorized access
  • Critical authentication bypasses
  • Remote code execution vulnerabilities
  • Wide-scale service disruption

11.1 Incident Escalation

Emergency reports automatically escalate to:

11.2 After-Hours Support

Our security team provides after-hours coverage for:

12. Compliance and Standards

12.1 Security Standards

InkDecoder's security program aligns with industry standards:

12.2 Regulatory Compliance

Our security practices support compliance with:

12.3 Security Certifications

Our team maintains relevant security certifications:

12.4 Audit and Assessment

Regular security assessments include:

Thank You: InkDecoder appreciates the security research community's efforts to help keep our service secure. Your responsible disclosure and collaboration help protect our users and improve our security posture.

🔒 Hosting Security Footnote

Infrastructure Security: InkDecoder's hosting infrastructure is secured through enterprise-grade cloud security controls, including:

Note: While our cloud infrastructure providers maintain robust security controls, security researchers should focus testing efforts on InkDecoder-controlled applications and services rather than underlying hosting infrastructure.

InkDecoder Security Contact & Responsible Disclosure Policy - Effective as of
Security is a collaborative effort between InkDecoder and the security research community.