Platform
Capabilities AI Agents Zero-Day Suite Reports & Evidence Integrations
Compare
Why PhantomYerra vs Mythos AI vs GPT-5.4 Cyber
Resources
Help Docs What's New Ask PhantomYerra Methodology Release Notes
 
Contact Request Access Client Login
Security · Coordinated Disclosure

Security Policy

PhantomYerra is a security product. Finding and fixing vulnerabilities in our own code is a first-class part of our work. This page describes how to report an issue, the commitments we make in response, and the controls we have in place across the product’s supply chain.

Version: v45.1.0 Last updated: 2026-04-15 Contact: security@phantomyerra.com security.txt: /.well-known/security.txt

1 Reporting a vulnerability

Email security@phantomyerra.com with a clear description of the issue. Include:

  1. Affected component and version (PhantomYerra v45.x, the license service, the marketing site, the auto-updater, etc.).
  2. Impact: what an attacker can do, and the conditions required.
  3. Steps to reproduce, preferably with a proof-of-concept or a short video.
  4. Any logs, screenshots, or HTTP traces that demonstrate the issue.
  5. Your preferred name for the credit line (or request anonymity).
Please do not File public GitHub issues, tweet details, or post to forums before we have coordinated a disclosure window. Do not exfiltrate or access user data beyond what is strictly needed to prove the issue.

2 Response SLAs

SeverityFirst acknowledgementTriage decisionFix target
Critical24 hours72 hours7 days
High48 hours7 days30 days
Medium5 business days14 daysnext release
Low5 business days30 dayswhen practical

We assign severity using CVSS 3.1 plus our own exploitability weighting. “First acknowledgement” means a human has read the report; “triage decision” means we have validated the issue and set a target fix date; “fix target” is the date by which a released build contains the fix.

3 Safe harbor

Good-faith research is welcome Activity conducted consistent with this policy is (a) authorized by us and (b) considered good-faith security research for the purposes of the US Computer Fraud and Abuse Act, UK Computer Misuse Act, EU NIS2, and similar statutes, to the maximum extent we can legally extend such authorization.

To stay within scope, a researcher must:

4 Scope

In scope

Out of scope

5 Credit and rewards

Valid, previously-unknown issues are publicly credited on the release notes for the fix (at the reporter’s option), and included in the next security advisory. We do not operate a monetary bug-bounty program at this time; enterprise customers and long-term partners may be eligible for commercial acknowledgement on a case-by-case basis.

6 Supply-chain and build integrity

Every released build is accompanied by:

Internal build hardening:

7 Cryptography

8 Encrypted communications

If your report contains sensitive reproduction data, email us the non-sensitive summary and we will reply with an ephemeral upload URL over TLS. We maintain a current PGP key at:

curl -s https://phantomyerra.com/.well-known/pgp-key.asc | gpg --import Fingerprint: published on /.well-known/security.txt

9 History

We publish security advisories at phantomyerra.com/versionhistory. Each advisory carries a CVE identifier (where assigned), severity, affected versions, fixed version, and credit.

10 Contact

Security: security@phantomyerra.com
Press / coordinated-disclosure coordination: security@phantomyerra.com (same inbox, tag subject [coord]).
Privacy: privacy@phantomyerra.com