PANGUARDAI
文件使用場景價格GitHub
立即開始

法律條款

  • 隱私政策
  • 服務條款
  • 資料處理協議
  • Cookie 政策
  • 合理使用政策
  • 弱點揭露政策
  • 服務等級協議
  • 安全白皮書

Vulnerability Disclosure Policy

Last updated: February 2026

Panguard AI, Inc. ("Panguard") is committed to the security of our platform and the protection of our customers. We welcome and encourage responsible security research. This policy outlines the guidelines for reporting vulnerabilities to us and describes our commitment to working with security researchers in good faith.

1. Scope

The following assets are in scope for this program:

  • panguard.ai -- Our primary marketing website and web application
  • app.panguard.ai -- The Panguard dashboard and management console
  • api.panguard.ai -- The Panguard REST API and GraphQL endpoints
  • *.panguard.ai -- Other first-party subdomains operated by Panguard

Mobile applications, open-source libraries published by Panguard on GitHub, and the Panguard endpoint agent are also in scope.

2. Safe Harbor

Panguard will not pursue legal action against security researchers who discover and report vulnerabilities in good faith and in compliance with this policy. Specifically:

  • We consider security research conducted in accordance with this policy to be authorized and will not initiate legal action against you
  • We will not pursue claims under the Computer Fraud and Abuse Act (CFAA) or equivalent laws for research conducted under this policy
  • If legal action is initiated by a third party against you for activities conducted in accordance with this policy, we will take steps to make it known that your actions were authorized by us
  • We will work with you to understand and resolve issues quickly

This safe harbor applies only to legal claims under Panguard's control and does not bind independent third parties.

3. Reporting Guidelines

When you discover a vulnerability, please follow these guidelines:

3.1 How to Report

  • Submit vulnerability reports via email to security@panguard.ai
  • Encrypt sensitive reports using our PGP key (see Section 6 below)
  • Include a detailed description of the vulnerability, including steps to reproduce, affected systems, and potential impact
  • Provide proof of concept where possible, with minimal impact to production systems

3.2 No Public Disclosure

You must not publicly disclose the vulnerability until Panguard has had a reasonable opportunity to investigate and remediate the issue. We request a 90-day disclosure window from the date of your initial report. If we require additional time to address the issue, we will coordinate with you on an appropriate disclosure timeline.

3.3 Good Faith Practices

  • Do not access, modify, or delete data belonging to other users
  • Do not perform actions that could degrade the Service for other users (e.g., denial of service testing)
  • Do not use automated scanning tools at excessive rates against production systems
  • Do not exploit a vulnerability beyond what is necessary to demonstrate the issue
  • Stop testing and notify us immediately if you encounter any user data during your research

4. Out of Scope

The following vulnerability types and testing methods are out of scope for this program:

  • Social engineering attacks (phishing, vishing) against Panguard employees or customers
  • Physical attacks against Panguard offices or data centers
  • Denial of service (DoS/DDoS) attacks against production systems
  • Vulnerabilities in third-party software or services not operated by Panguard
  • Spam, email spoofing, or SPF/DKIM/DMARC configuration issues
  • Clickjacking on pages with no sensitive actions
  • Content injection without demonstrable security impact
  • Missing HTTP security headers without a demonstrated exploit
  • Vulnerabilities requiring physical access to a user's device

5. Contact

Security Response Team

Email: security@panguard.ai

We aim to acknowledge receipt of your report within 2 business days and provide an initial assessment within 5 business days.

6. PGP Key

For encrypted communications, please use our PGP public key:

Fingerprint: [PGP key fingerprint will be published here]

The full public key is available at: https://panguard.ai/.well-known/pgp-key.txt

7. Hall of Fame

We recognize and appreciate the contributions of security researchers who help us keep Panguard secure. With your permission, we will acknowledge your contribution on our Security Hall of Fame page.

The Panguard Security Hall of Fame will be published here once our responsible disclosure program is fully operational.
PANGUARDAI

你的 AI 資安守衛。一行指令安裝,AI 全面防護。

產品

  • Guard 防護
  • Chat 助手
  • Trap 蜜罐
  • Report 報告

資源

  • 技術文件
  • GitHub

法律條款

  • 隱私政策
  • 服務條款

© 2026 Panguard AI, Inc. 版權所有。