Vulnerability Disclosure Policy

This document outlines the official Vulnerability Disclosure Policy for Malicious Erection LLC.

TL;DR AS LONG AS VENDORS AREN’T DICKS, WE WON’T BE DICKS EITHER

ALSO THIS POLICY DOESN’T APPLY TO XIAOMI. WE WILL ALSO BE DICKS TO XIAOMI. FUCK XIAOMI.

Reach Out Policy

Malicious Erection LLC will endeavor to use communication channels documented by the vendor for security issues. If a security contact is provided, this will be used in the first instance, otherwise communication will be attempted by the most appropriate sources, such as:

Starting from the initial communication attempt, the vendor has 4 weeks to respond to Malicious Erection LLC. If no response is received, then Malicious Erection LLC will publicly disclose the technical details of the security issue immedietely.

Communication Policy

If communication is established, then Malicious Erection LLC will work with the vendor to securely communicate the technical details of the security issue. Once details have been disclosed, it is expected that the vendor will inform Malicious Erection LCC about the intended fix for the security issue, as well as establishing a “reasonable timeline” for the publication of patches and updates to the vendor’s customers. If a “reasonable timeline” is established, Malicious Erection LLC will agree hold off on publicly disclosing its findings.

The definition of “reasonable timeline” is up to the sole discretion of Malicious Erection LLC. This timeline will typically include:

The vendor is expected to keep Malicious Erection LLC updated with the progress of the timeline. As the patch release date approaches, Malicious Erection LLC may reach out to the vendor for a status on the timeline.

If the communication between Malicious Erection LLC and the vendor stops due to the vendor failing to communicate, then the security issues will be publicly disclosed immedietely. Below are some example reasons that will force Malicious Erection LLC to immedietely disclose the security issue:

Disclosure Date

When the vendor establishes a date that patches are released and the vendor’s customers are notified, a coordinated “disclosure date” will be established between the vendor and Malicious Erection LLC. All technical details of the security issue will be disclosed once the “disclosure date” has been met. The technical details may include, but is not limited to, the following:

Malicious Erection LLC prefers to have the “disclosure date” be the same date as when patches are released. However, the “disclosure date” may be extended further down the timeline due to various reasons, such as:

Two weeks prior to the “disclosure date”, Malicious Erection LLC may reach out to the vendor to confirm that both parties are on track to meet the agreed upon date. If no response is received from the vendor, and the “disclosure date” is met, then Malicious Erection LLC will publicly disclose the technical details immedietely on said date.

Extension Policy

It is understood that creating patches can have unintended concequences. Therefore, the vendor is encouraged to postpone the “disclosure date” due to “reasonable reasons”, such as:

It is up to the sole discretion of Malicious Erection LLC of what a “reasonable reason” is. If Malicious Erection LLC has reason to believe that the vendor is postponing the disclosure date for iniquitous reasons, then the technical details of the security issue will be publicly disclosed immedietely.