Ironmark Authoring Suite is deployed on defense and government networks. Security matters. This policy provides a clear, safe path to report vulnerabilities.
Ironmark will not pursue legal action against any individual or organization that discovers and reports a security vulnerability in good faith in accordance with this policy. We consider responsible security research a service to our customers and to the community, and we commit to working with researchers transparently and without retaliation.
Please include:
Encrypted submission is welcome. PGP key available on request.
Do not report security vulnerabilities through GitHub issues, support tickets, or any public channel.
We will work to address confirmed vulnerabilities within the following target timelines from the date of confirmation:
| Severity | Description | Fix Target |
|---|---|---|
| Critical | Remote code execution, authentication bypass, data exfiltration | 72 hours |
| High | Privilege escalation, stored XSS, SQL injection, path traversal | 7 days |
| Medium | CSRF, reflected XSS, information disclosure, insecure defaults | 30 days |
| Low | Best-practice deviations, minor information leakage, hardening recommendations | Next release |
Researchers who report valid vulnerabilities are eligible for the following:
| Severity | Reward | Recognition |
|---|---|---|
| Critical | 3 months free service credit or extended maintenance | Named acknowledgment (if desired) |
| High | 1 month free service credit or extended maintenance | Named acknowledgment (if desired) |
| Medium | 1 month free service credit or extended maintenance | Named acknowledgment (if desired) |
| Low | Written acknowledgment | Optional listing |
Service credits apply to active hosted subscriptions. For on-premise customers, equivalent value is applied as extended maintenance. Recognition is entirely optional — full confidentiality is respected if preferred.
On hosted instances: If you are a hosted customer and discover a potential vulnerability, please report it without attempting to verify it against other customers' data. Your instance is isolated — you should only ever be able to see your own data. If you believe you can see data that is not yours, stop immediately and report it.
We ask that researchers:
We commit to the same good faith in return — transparent communication, prompt response, and no legal action against researchers acting within these guidelines.
We support coordinated disclosure. If you report a vulnerability to us, we ask for a reasonable period to address it before public disclosure. We will work with you to agree on a disclosure timeline.
If we have not resolved a Critical or High severity issue within the target timeframe, we understand that you may need to disclose. Please notify us before doing so and we will work to coordinate the disclosure.
This policy is reviewed annually and updated as needed. Questions about the policy itself can be sent to the same address.
Effective: March 19, 2026