Skip to content
Building your order...

Astound Security: Responsible Disclosure Policy

Responsible Disclosure

Astound believes effective responsible disclosure of security vulnerabilities requires mutual trust, respect, and transparency between Astound and Security Researchers. Together, we promote the continued security and privacy of Astound customers, products, and services.

Vulnerability Reporters

Astound accepts vulnerability reports from all sources. Astound defines a security vulnerability as an unintended condition that could be exploited to compromise the integrity, availability or confidentiality of our products, services, or confidential information.

Astound’s Commitment to and requests of Vulnerability Reporters

  • We maintain trust, respect and confidentiality in our exchanges with security researchers. We ask that you do the same by giving Astound the time to investigate your report and mitigate any vulnerability without disclosing the vulnerability publicly.
  • We will work with you to validate reported vulnerabilities in accordance with our commitment to security and privacy. We ask that you do the same by providing us with information that will further our understanding and investigation of your report.
  • We investigate and remediate issues in a manner consistent with helping to protect the safety and security of those potentially affected by a reported vulnerability. We ask that Vulnerability Reporters refrain from public disclosure of the reports until this process has been completed.

Vulnerability Reporting

Astound recommends that Vulnerability Reporters share the details of any suspected vulnerabilities using the web form below. The Astound Security team will conduct a thorough investigation, contact you for any clarification or additional data if required, and then take appropriate action for resolution. To encrypt a submission via email, use the public key provided on this page.

All fields are required unless indicated as optional.

  • Help us get an idea of what this vulnerability is about.
  • Describe the vulnerability and its impact. Provide a proof of concept or replication steps.
  • Encryption

    Alternatively, you may send vulnerability submissions or questions to the Astound Security Team via email to Encryption key provided below: