Security Policy
Responsible Disclosure Program
1. Introduction
At Einix SA, security is fundamental to everything we build. We develop enterprise software for defense, energy, and critical infrastructure sectors where security failures can have serious consequences. We value the security research community and welcome responsible disclosure of vulnerabilities.
This policy describes how to report security vulnerabilities to us, what you can expect from us, and what we expect from you.
2. Reporting a Vulnerability
Security Contact
Email: security [at] einix [dot] fr
PGP Key: Download PGP Key
Web Form: Contact Form (Recommended)
Languages: English, French, German
When reporting a vulnerability, please include:
- A detailed description of the vulnerability
- Steps to reproduce the issue
- Affected product(s) and version(s)
- Any proof-of-concept code or screenshots
- Your assessment of the severity and potential impact
- Your contact information for follow-up
3. Our Commitment
Response Timeline
- Initial Response: Within 48 hours
- Triage & Assessment: Within 7 days
- Status Updates: Every 14 days minimum
- Resolution Target: 90 days for most issues
We commit to:
- Acknowledging receipt of your report within 48 hours
- Providing an estimated timeline for resolution
- Keeping you informed of our progress
- Crediting you in any public disclosure (unless you prefer anonymity)
- Not pursuing legal action against researchers who follow this policy
4. Scope
| Asset | Status |
|---|---|
| einix.fr website and subdomains | In Scope |
| Einix product software (with license) | In Scope |
| Open source projects (SHELLOG, DECISCOPE CLI) | In Scope |
| API endpoints documented in product documentation | In Scope |
| Third-party services and integrations | Out of Scope |
| Physical security testing | Out of Scope |
| Social engineering attacks | Out of Scope |
| Denial of Service attacks | Out of Scope |
5. Qualifying Vulnerabilities
We are particularly interested in:
- Remote code execution vulnerabilities
- Authentication and authorization bypasses
- Cryptographic weaknesses
- Injection vulnerabilities (SQL, command, etc.)
- Cross-site scripting (XSS) and CSRF
- Sensitive data exposure
- Server-side request forgery (SSRF)
- Business logic flaws with security impact
Non-Qualifying Issues
The following typically do not qualify:
- Vulnerabilities requiring physical access
- Self-XSS (user attacking themselves)
- Missing security headers without demonstrable impact
- Clickjacking on pages without sensitive actions
- Rate limiting issues without security impact
- Outdated software versions without exploitable vulnerability
6. Researcher Guidelines
When conducting security research, please:
- Do not access, modify, or delete data belonging to other users
- Do not perform denial of service attacks
- Do not send unsolicited emails to users (phishing tests)
- Do not publicly disclose vulnerabilities before we've resolved them
- Do stop testing and report immediately if you access sensitive data
- Do use test accounts you create yourself when possible
- Do minimize the impact of your testing on our systems
7. Safe Harbor
Einix SA considers security research conducted in accordance with this policy to be:
- Authorized under applicable anti-hacking laws
- Authorized under applicable anti-circumvention laws
- Exempt from restrictions in our Terms of Service that would otherwise prohibit security research
We will not pursue civil or criminal action against researchers who follow this policy. If legal action is initiated by a third party, we will take steps to make it known that your actions were conducted in compliance with this policy.
8. Recognition
We believe in recognizing the valuable contributions of security researchers. For qualifying vulnerabilities, we offer:
- Public acknowledgment (with your permission) in our security advisories
- A letter of appreciation for your professional portfolio
- Consideration for our Hall of Fame
Note: We do not currently offer monetary bounties, but we deeply value and appreciate responsible disclosure.
9. Contact
For security matters, please use our secure contact form or reach us at:
Email: security [at] einix [dot] fr
Response Time: Within 48 hours
Encryption: PGP key available at /.well-known/pgp-key.txt
Last updated: February 2026
Back to Home