Pešek & Mudra Security

We take security seriously and appreciate responsible disclosures. This page describes how to report security issues for services operated under this domain and what you can expect from us.

1 Contact

Please report vulnerabilities by email:

If you need encrypted communication, see the Encryption section below.

2 Scope

This policy applies to publicly reachable services and applications operated under our domains, including (but not limited to):

If you’re unsure whether something is in scope, send a report anyway and we’ll tell you.

3 Out of scope

The following are generally out of scope (unless you can demonstrate real impact in our environment):

4 Safe harbor

We consider good-faith security research to be authorized under this policy.

If you:

…then we will not initiate legal action against you for accidental, good-faith violations of this policy.

5 Testing guidelines

Please:

If the vulnerability involves sensitive data, include only redacted samples in the report (or describe the evidence without attaching it). If you have to share proof, do it carefully and minimize exposure.

6 What to include in a report

A great report includes:

If you have a CVE request or want coordinated disclosure, mention it explicitly.

7 Response and remediation timeline

We aim for:

Severity rough guide:

8 Disclosure

We support coordinated disclosure. If you plan to publish a write-up:

9 Hall of Fame

If you’d like to be credited, include:

If you prefer anonymity, we’ll list you as “Anonymous”.

10 Rewards / bounties

At this time, we do not offer monetary rewards.

11 Encryption

If you want encrypted communication, you can request an encryption method in your email (PGP, age, etc.). We will provide keys or a preferred mechanism on request.

Our main developer t@tsandrini.sh provides their keys both at http://tsandrini.sh/tsandrini.gpg and https://keybase.io/tsandrini

This policy does not grant permission to:

When in doubt, ask first — we’re friendly.