
Vulnerability Disclosure Policy
Mimic Networks, Inc. (Mimic) is committed to ensuring the security of our products and services and protecting the trust our customers place in us. This policy is intended to provide clear guidelines for conducting vulnerability discovery activities and to outline our preferences for reporting any discovered vulnerabilities to us. We encourage all security researchers to report potential vulnerabilities in our systems.
Authorization
Mimic will not take legal action against security researchers who act in good faith and comply with this policy. We will consider your research authorized and will work with you to resolve the issue promptly. Should any third party initiate legal action against you for activities conducted in compliance with this policy, we will make our authorization known to help protect you.Scope
This policy applies to all products and services offered by Mimic. If you are unsure whether a system is in scope, please contact us at security+vdp@mimic.com before beginning your research.Test Methods
Under this policy, “research” means:- - Notifying us as soon as possible after discovering a real or potential security issue.
- - Avoiding privacy violations, degradation of user experience, disruption to production systems, and destruction or manipulation of data.
- - Only using exploits to confirm the presence of a vulnerability. Do not use an exploit to access or exfiltrate data, establish persistent access, or pivot to other systems.
- - Stopping testing immediately if you encounter sensitive data and notifying us without disclosing the data to anyone else.
- - Network DoS/DDoS attacks, social engineering, or physical security testing.
Reporting a Vulnerability
If you believe you have found a security vulnerability, please report it by emailing security+vdp@mimic.com. Information submitted under this policy will only be used for defensive purposes to mitigate or remediate vulnerabilities.When reporting a vulnerability, include the following information:- - Name of the affected product or service
- - Description of the vulnerability and its impact
- - Steps to reproduce, including proof of concept or screenshots
What You Can Expect from Us
- - We will acknowledge receipt of your report within 3 business days.
- - We will confirm the existence of the vulnerability and keep you informed of our remediation efforts.
- - We will coordinate with you on disclosure timelines and provide credit for your contributions.
- - We will remain transparent about the progress, including any challenges or delays in resolving the vulnerability.