Skip to main content

Responsible Disclosure Policy

Effective Date: December 21, 2024

Guidelines for reporting security vulnerabilities to Admiral.

At Admiral, maintaining the security, privacy, and integrity of our products is our highest priority. We truly appreciate the efforts of researchers who contribute to improving our security and/or privacy posture.

If you believe you have found a security or privacy vulnerability that could impact Admiral or our users, we encourage you to report it promptly. We will investigate all legitimate reports and address confirmed issues as quickly as possible. This policy outlines considerations and commitments for the disclosure of potential security vulnerabilities to Admiral in a responsible manner.

Purpose

The main goal of our vulnerability disclosure policy is to help ensure that vulnerabilities are patched or fixed in a timely manner with the ultimate objective of securing our users' information. This policy is intended to give clear guidelines for reporting potentially unknown or harmful security vulnerabilities.

Security Researchers

Admiral recognizes the positive contributions of security researchers and encourages the responsible and direct disclosure of potential security vulnerabilities to us. We accept vulnerability reports from all sources.

Our Commitments to Researchers

Admiral is committed to working collaboratively with security researchers.

  • We will maintain standard confidentiality in our communications with you.
  • We will work with you to validate and respond to your disclosure.
  • We will investigate and use all reasonable efforts to remediate validated issues in a manner consistent with protecting the safety and security of those potentially affected by a reported vulnerability.
  • Admiral reserves all of its legal rights in the event of non-compliance with this Policy, but it does not intend to pursue legal action against any party that conducts security research and discloses information to us in good faith and as outlined in this Policy.

What We Ask of Researchers

To ensure responsible disclosure and avoid unintended harm, we request that researchers:

  • We request that you communicate information about potential security vulnerabilities in a responsible manner. This means complying with all applicable laws and respecting the privacy of individuals. Your security research should also avoid degradation of our user's experiences, disruption to systems, and destruction of data.
  • We request that researchers provide sufficient technical detail and background necessary for our team to identify and validate reported issues.
  • We request that researchers act for the common good, protecting user privacy and security by refraining from publicly disclosing vulnerabilities.

Scope

This policy applies to the following Admiral-owned systems and services:

  • admiral.io, and the following hostnames:
    • admiral.io
    • api.admiral.io
    • console.admiral.io
  • Any other subdomain of admiral.io and all customer applications are excluded from this policy.

Any services not expressly listed above, such as any connected services, are excluded from scope and are not authorized for testing. Additionally, vulnerabilities found in systems from our vendors fall outside of this policy's scope and should be reported directly to the vendor according to their disclosure policy (if any). If you aren't sure whether a system is in scope or not, please contact [email protected] before starting your research.

The following activities are explicitly out of scope of this policy:

  • Compromising the integrity, availability, or confidentiality of non-public information in the possession of Admiral.
  • Failing to immediately delete/destroy sensitive information or personal data you may inadvertently access.
  • Publicly disclosing any potential vulnerability without the express written consent of Admiral.
  • Intentionally or negligently causing a denial-of-service condition for any user beyond the researcher.
  • Exploitation of any vulnerability that sends bulk unsolicited or unauthorized messages (spam).
  • Posting, transmitting, uploading, or linking malware, viruses, or similar harmful software that could impact our services, products or customers or any other third party.
  • Testing third-party websites, applications, or services that integrate with our services or products.
  • Conducting social engineering (including phishing) of Admiral employees, contractors, or customers.
  • Any physical attempts against Admiral property or data centers.

How to Report

Please report security vulnerabilities by sending an email to [email protected] using our optional PGP key below. Please provide all known information related to the suspected security vulnerability you are reporting.

Upon submission, we will acknowledge receipt of each vulnerability report, conduct a thorough investigation, and then take appropriate action for resolution, if any.

While no type of vulnerability is explicitly out of the scope of this policy, researchers are asked to consider the attack scenario and exploitability associated with any potential security vulnerability submitted.

Public GPG Key

If you'd like to encrypt your communications with Admiral, please use our PGP key below. All security-related emails from Admiral will be signed with this key.

Key ID

2084859F6A986E9B

Key Type

RSA

Key Size

4096

PGP Public Key
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=rxx0
-----END PGP PUBLIC KEY BLOCK-----