This policy outlines how ADHD-Plus handles the reporting of security vulnerabilities. Before submitting a report, please review this document in full and ensure your actions remain compliant with it. We greatly value security researchers and individuals who responsibly disclose vulnerabilities, though we do not offer monetary rewards for such reports.
How to Report
If you believe you’ve identified a security weakness in any ADHD-Plus system:
Submit your report to the contact address listed in our security.txt file.
Provide:
The affected website, IP address, or page.
A short description of the vulnerability type (e.g., “XSS vulnerability”).
Clear, safe, and non-destructive reproduction steps or proof of concept.
These details help us quickly assess and prevent duplication or malicious exploitation, such as sub-domain takeovers.
Our Response
Acknowledgement: Within 5 working days of receiving your report.
Initial Review: We aim to triage within 10 working days.
Remediation Priority: Determined by severity, impact, and exploit complexity.
Some issues may take longer to resolve, but you will be updated on progress. Please avoid requesting status updates more than once every 14 days to allow our team to focus on remediation. Once the vulnerability is fixed, we may invite you to verify the solution. If you wish to make your report public, please coordinate disclosure timing with us.
Rules of Engagement
You must NOT:
Break laws or regulations.
Access or download unnecessary, excessive, or sensitive data.
Modify, corrupt, or delete data.
Use destructive or high-intensity scanning tools.
Attempt denial-of-service attacks.
Disrupt ADHD-Plus operations.
Submit non-exploitable or “best-practice” gap reports (e.g., missing security headers, TLS1.0 support).
Share vulnerability details outside of the agreed communication channel.
Attempt phishing, social engineering, or physical intrusion against ADHD-Plus staff or infrastructure.
Request payment for disclosure.
You must:
Comply with data protection regulations, including GDPR.
Not share, redistribute, or inadequately secure any data accessed.
Delete all data obtained during testing as soon as it is no longer needed, and no later than 1 month after remediation, unless otherwise required by law.
GDPR Compliance
Any handling of personal data in the course of vulnerability testing must comply with the UK GDPR and Data Protection Act 2018. Personal data should only be accessed if strictly necessary for confirming the vulnerability and must be securely deleted immediately after use. You must not retain, disclose, or use any such data for purposes beyond reporting the vulnerability.
Legal Notice
This policy supports recognised best practices in responsible vulnerability disclosure. It does not grant immunity from legal action if your conduct breaches applicable laws or causes ADHD-Plus—or its partners—to violate legal obligations.