Effective Date: April 23, 2026
This policy establishes procedures for identifying, assessing, and remediating security vulnerabilities in VaultKeeper systems within defined service level agreements (SLAs).
Vulnerabilities are identified through:
| Severity | CVSS Score | Description |
|---|---|---|
| Critical | 9.0 - 10.0 | Actively exploitable, direct access to consumer data, remote code execution |
| High | 7.0 - 8.9 | Significant risk, potential data exposure, privilege escalation |
| Medium | 4.0 - 6.9 | Limited risk, requires specific conditions to exploit |
| Low | 0.1 - 3.9 | Minimal risk, informational findings |
| Severity | Remediation Deadline | Actions |
|---|---|---|
| Critical | 24 hours | Immediate patch or mitigation. Consider taking affected service offline if needed. |
| High | 7 days | Prioritize patch deployment. Apply compensating controls if patch is delayed. |
| Medium | 30 days | Schedule patch in next maintenance cycle. |
| Low | 90 days | Address in regular development cycle. |
For vulnerabilities in managed services (Firebase, Cloudflare Workers), remediation is handled by the service provider. Our responsibility is to:
If a security vulnerability is discovered in VaultKeeper by an external party, we encourage responsible disclosure via the contact information in our Privacy Policy.
This policy is reviewed at least annually or after any significant security incident.