Responsible Disclosure Policy

Last Updated: February 22, 2026

At RSIG and RoyalSnek, the security of our systems and the protection of our users' data are top priorities. We value the work of security researchers and appreciate proactive, voluntary disclosure.


1. Our Commitment

We recognize the invaluable contribution of the cybersecurity community in keeping the internet safe. When you report a vulnerability to us, we commit to taking every report seriously, investigating your findings thoroughly, and maintaining an open line of communication throughout the process. We are truly grateful for your time and effort in helping us stay secure.

2. Scope

This policy applies to all internet-facing services and systems provided under the following domain:

  • *.royalsnek.com

Note: Third-party services or integrations not directly operated by RoyalSnek are excluded from this scope.

3. Submission Channels & Response

If you believe you have discovered a security vulnerability, please report it through one of the following channels:

We respect your time and aim to provide an initial response and evaluation of your report within 5 to 14 business days of reception.

Secure Communication (PGP)

For sensitive findings, we encourage encrypting your report using our PGP key:

Fingerprint: 4E6B 12A9 88C3 00F1 77B2  D4E5 99A1 0B22 1234 ABCD
Key ID: 0x1234ABCD

4. Report Requirements

To help our team validate the issue efficiently, your report must include clear and concise details. While a Proof of Concept (PoC) is not mandatory for the initial filing, it is highly recommended to help us understand the impact faster.

A Note on Follow-ups

Our team may reach out with follow-up questions to better understand your findings. To ensure we can properly credit your work, please provide the necessary details within a reasonable timeframe. If we are unable to verify the issue due to a lack of detail, the report may be closed without credit, even if the vulnerability is addressed later.

5. Mandatory Embargo

By submitting a report, you agree to a mandatory embargo period to ensure our users remain protected. Public disclosure is prohibited until:

  • 90 days from the date a RSIG team member has personally received and acknowledged the report, OR
  • Until a formal patch has been released by our team.
Communication Assurance

To ensure the disclosure timeline commences without delay, researchers must maintain an active line of communication. We strongly recommend whitelisting security@royalsnek.com and support@royalsnek.com. If you suspect your email provider may filter our correspondence, please utilize our support ticket system to ensure your report is personally received and verified by our team.

6. Report Evaluation & Rejection

While we investigate every submission, RoyalSnek reserves the right to reject reports that do not meet our criteria. A report may be rejected for reasons including, but not limited to:

  • Insufficient Detail: The report lacks the information necessary to understand the vulnerability.
  • Inability to Reproduce: Our team is unable to verify the issue based on the provided steps.
  • Scope Conflict: The vulnerability exists in a third-party service or integration not directly operated by RoyalSnek.

In the event of a rejection, we will inform you as soon as possible and provide the specific reasoning behind our decision. Please note that RoyalSnek does not re-evaluate reports once a final rejection has been issued.

7. Compensation & Recognition

As a gesture of our appreciation for your voluntary work, we want to ensure you receive proper credit for your contributions:

  • Voluntary Basis: All reports are made voluntarily. RSIG does not offer bug bounties or monetary rewards.
  • First-to-Report: We only award credit to the first researcher to report a specific, verifiable vulnerability.
  • Credit: If accepted, your name or pseudonym will be officially credited in the relevant patch notes to acknowledge your help.

8. Safe Harbor

RoyalSnek will not initiate legal action against researchers who report vulnerabilities in good faith. If we find that a report was filed without malicious intent and solely for the purpose of improving our security, we consider your research to be authorized. We want you to feel safe helping us, provided you adhere to the ethics and guidelines outlined in this policy.

9. Changes to this Policy

We reserve the right to modify this policy at any time by publishing a revised version on this page. Vulnerabilities disclosed prior to any update will remain subject to the policy version in effect at the time of the report.

Exclusions

The following are generally excluded from credit:

  • Missing SPF/DKIM/DMARC records.
  • Social engineering or Phishing.
  • Clickjacking on non-sensitive pages.
  • SSL/TLS best practices (without exploit).
  • Reports from automated vulnerability scanners.
Researcher Ethics

Act in good faith. Avoid:

  • Privacy violations.
  • Destruction or modification of data.
  • Service interruptions (DoS/DDoS).

Testing should be limited to confirmation without causing harm.