Galileo
Responsible Disclosure Program
Our Commitment to Security
We are committed to maintaining the highest standards of security across our platform. We welcome the support of the security research community and encourage responsible disclosure of vulnerabilities that help us protect our users, partners, and infrastructure.
This program does not offer monetary rewards or service credits. Instead, we provide:
Safe Harbor protections
Transparent communication
Public recognition for impactful contributions
1. Scope of Testing
Testing is permitted only on systems we own and operate.
In Scope
Web applications
APIs and backend services
Authentication and session management flows
Mobile applications and associated backend endpoints
Publicly accessible subdomains and cloud resources
Out of Scope
Denial‑of‑service attacks
Social engineering
Physical security testing
Third‑party systems
Automated scanning that degrades performance
Accessing or modifying data that does not belong to you
2. Rules of Engagement
To ensure safe and responsible testing:
Do not disrupt services or degrade performance
Do not access or modify data belonging to others
Stop immediately if you encounter sensitive data
Use only accounts you own or are authorised to test
Do not publicly disclose vulnerabilities before we confirm a fix
Do not attempt to pivot into third‑party systems
Researchers acting in good faith and following this policy are protected under our Safe Harbor commitment.
3. How to Report a Vulnerability
A valid report should include:
Clear description of the vulnerability
Step‑by‑step reproduction instructions
Impact assessment
Proof‑of‑concept (screenshots, payloads, or videos)
Your contact details
If you believe you’ve discovered a security vulnerability, please contact our security team at:
Security[at]galileo[dot]ai
We encourage encrypted communication where possible.
We acknowledge reports within 48 hours and provide updates throughout the triage process.
4. Triage & Validation Process
Our security and engineering teams follows a structured workflow:
Acknowledge the report
Validate and reproduce the issue
Classify severity
Communicate status updates
Deploy a fix
Invite the researcher to retest
5. Severity Matrix
Severity reflects impact, not attacker identity.
Severity | Definition |
Critical | Full system compromise, admin takeover, RCE, authentication bypass |
High | Sensitive data exposure, major privilege escalation, critical workflow abuse |
Medium | Limited data exposure, moderate privilege escalation, workflow manipulation |
Low | Minor misconfigurations, low‑impact issues |
Informational | Non‑exploitable best‑practice issues |
6. Safe Harbor
We will not pursue legal action against researchers who:
Act in good faith
Follow this policy
Avoid privacy violations
Avoid service disruption
Provide reasonable time for remediation
7. Responsible Disclosure Framework
Submission Requirements
Description
Reproduction steps
Impact analysis
Proof‑of‑concept
Suggested remediation (optional)
Remediation SLAs
Critical: Immediate
High: 7 days
Medium: 14–30 days
Low: 30–90 days
Disclosure Timeline
Public disclosure permitted only after we confirm the fix
Extensions may be requested for complex issues
8. Researcher Recognition
We value the contributions of the security community. Researchers who responsibly disclose vulnerabilities may be:
Offered a job interview with our CTO or engineering leaders
Invited to private testing programs
Acknowledged publicly (with consent)
9. FAQs
Do you offer monetary rewards / bug bounties?
No. This is a no‑reward Responsible Disclosure Program. For recognition, please refer to the Researcher Recognition section.
Can I disclose the vulnerability publicly?
Only after we confirm the fix.
What if I accidentally access sensitive data?
Stop immediately and report it. Acting in good faith protects you.
Do insider‑only vulnerabilities count?
Yes — severity is based on impact, not attacker identity
10. Contact Us
If you believe you’ve discovered a security vulnerability, please contact our security team at: security[at]galileo[dot]ai
We encourage encrypted communication where possible.