[{"data":1,"prerenderedAt":129},["ShallowReactive",2],{"security-en":3},{"id":4,"title":5,"body":6,"description":113,"extension":122,"meta":123,"navigation":124,"path":125,"seo":126,"stem":127,"__hash__":128},"security_disclosure/security-disclosure/en.md","Security Disclosure Policy",{"type":7,"value":8,"toc":112},"minimark",[9,13,18,27,30,46,50,53,57,71,75,78,82,85,99,103],[10,11,5],"h1",{"id":12},"security-disclosure-policy",[14,15,17],"h2",{"id":16},"reporting-security-issues","Reporting Security Issues",[19,20,21,22,26],"p",{},"If you discover a vulnerability in Aptli, please report it promptly to ",[23,24,25],"code",{},"security@aptli.io",".",[19,28,29],{},"Include the following information when possible:",[31,32,33,37,40,43],"ul",{},[34,35,36],"li",{},"A clear description of the issue.",[34,38,39],{},"Steps to reproduce the problem.",[34,41,42],{},"Affected URL, deployment, or feature.",[34,44,45],{},"Any screenshots, logs, or proof-of-concept details.",[14,47,49],{"id":48},"response-and-acknowledgement","Response and Acknowledgement",[19,51,52],{},"We aim to acknowledge every valid report within 72 hours and to keep you informed about our progress.",[14,54,56],{"id":55},"what-we-will-do","What We Will Do",[31,58,59,62,65,68],{},[34,60,61],{},"Review reports promptly and investigate the issue.",[34,63,64],{},"Confirm whether the report is valid.",[34,66,67],{},"Provide remediation guidance and deploy fixes as needed.",[34,69,70],{},"Keep communications confidential and respect your disclosure.",[14,72,74],{"id":73},"safe-harbor","Safe Harbor",[19,76,77],{},"When you act in good faith and follow the reporting process, we will not pursue legal action against you for the security research activity described in your report.",[14,79,81],{"id":80},"exclusions","Exclusions",[19,83,84],{},"Please do not submit:",[31,86,87,90,93,96],{},[34,88,89],{},"Requests for payment, bounty, or other compensation.",[34,91,92],{},"Personal data unrelated to the vulnerability.",[34,94,95],{},"Site abuse reports outside of security issues (such as spam or customer support requests).",[34,97,98],{},"Any activity that violates applicable law.",[14,100,102],{"id":101},"additional-information","Additional Information",[19,104,105,106,109,110,26],{},"Our security disclosure page is available at ",[23,107,108],{},"/security-disclosure"," and our security contact address is ",[23,111,25],{},{"title":113,"searchDepth":114,"depth":114,"links":115},"",2,[116,117,118,119,120,121],{"id":16,"depth":114,"text":17},{"id":48,"depth":114,"text":49},{"id":55,"depth":114,"text":56},{"id":73,"depth":114,"text":74},{"id":80,"depth":114,"text":81},{"id":101,"depth":114,"text":102},"md",{},true,"/security-disclosure/en",{"title":5,"description":113},"security-disclosure/en","NDeuwOixPEYmU2SzknXJ7O7NgCoVbXSP9OblUtmDqM0",1776778050646]