Legal - Security & Responsible Disclosure
We take the security of this website seriously. If you believe you have found a vulnerability, here is how to report it — and what you can expect from us in return.
- Effective
- May 22, 2026
- Last updated
- May 22, 2026
01Our commitment
Zaibex builds and operates software for clients in regulated industries, and we hold our own website to the same standard. We welcome reports from security researchers and will work with you in good faith to verify, triage, and fix valid issues.
02Reporting a vulnerability
If you believe you have found a security vulnerability in zaibex.com, email privacy@zaibex.com with:
- A clear description of the issue and its potential impact.
- The steps, URLs, or proof-of-concept needed to reproduce it.
- Any relevant context — browser, tooling, and the IP address you tested from.
Please report promptly and give us a reasonable opportunity to resolve the issue before disclosing it publicly. A machine-readable version of this contact is published at /.well-known/security.txt.
03Scope
In scope: the website at zaibex.com and its subdomains, and the public form endpoints (project enquiries, careers applications, and newsletter signup).
Out of scope:
- Third-party services we use but do not operate — for example, our hosting, email, and scheduling providers. Report those to the provider directly.
- Systems we build and host for clients under separate agreements.
- Findings from automated scanners without a demonstrated, realistic impact.
- Missing best-practice headers or configuration with no concrete, demonstrable exploit.
- Spam, social engineering, and physical attacks.
04Safe harbor
If you make a good-faith effort to comply with this policy during your research, we will consider your research authorized, we will work with you to understand and resolve the issue quickly, and we will not pursue or support legal action against you for it.
If legal action is initiated by a third party against you for activity that complied with this policy, we will make this authorization known.
05Research guidelines
To stay within the safe harbor above, please:
- Only test against accounts and data you own or have explicit permission to use.
- Do not access, modify, or delete data that is not yours.
- Stop at the point of demonstrating a vulnerability — do not pivot, exfiltrate data, or escalate further.
- Do not run denial-of-service, brute-force, spam, or load-testing attacks.
- Do not use social engineering, phishing, or physical intrusion against Zaibex, our clients, or our staff.
- Keep the details of any vulnerability confidential until we confirm it is resolved.
06What to expect from us
When you submit a report, we will:
- Acknowledge your report within five business days.
- Give you an assessment and an expected timeline once we have triaged it.
- Keep you updated as we work toward a fix.
- Let you know when the issue is resolved.
We do not currently run a paid bug-bounty program. With your permission, we are glad to credit you publicly once an issue is fixed.
07Contact
Security contact: privacy@zaibex.com
Machine-readable policy: /.well-known/security.txt