Responsible Disclosure

We only reward medium and high priority issues.

At PrismaNote BV we consider the security of our systems very important. Despite our concern for the security of our systems, it is possible that there is a weak spot. If you have found a weak spot in one of our systems, please let us know so that we can take measures as quickly as possible. We would like to work with you to better protect our customers and our systems.


We ask you:

    Email your findings to support@prismanote.com Encrypt your findings with our PGP key to prevent the information from falling into the wrong hands,Do not abuse the problem by, for example, downloading more data than necessary to demonstrate the leak or view, remove or modify third-party content,Do not share the problem with others until it is resolved and delete all confidential data obtained through the leak immediately after the leak is closed,Do not use physical security attacks , social engineering, distributed denial of service, spam or third-party applications, and Provide enough information to reproduce the problem so that we can resolve it as quickly as possible. Usually, the IP address or URL of the affected system and a description of the vulnerability is sufficient, but more complex vulnerabilities may require more.


What we promise:

    We will respond to your report within 3 days with our assessment of the report and an expected resolution date, If you have complied with the above conditions, we will not take any legal action against you regarding the report, We will treat your report confidentially and will do not share personal data with third parties without your permission unless this is necessary to comply with a legal obligation. Reporting under a pseudonym is possible, We will keep you informed of the progress of the resolution of the problem, In reporting about the reported problem, we will, if you wish, mention your name as the discoverer, and Offer as a thank you for your help we offer a reward for every report of a security problem that is unknown to us. We determine the size of the reward based on the severity of the leak and the quality of the report.
Share by: