Security & DevSecOps Practical By Samson Tanimawo, PhD Published Nov 11, 2025 4 min read

Vulnerability Disclosure Policy

Public-facing vuln disclosure. The policy.

Public-facing

Security researchers find vulnerabilities in your product. They are going to find them whether or not you have a way to report them. The vulnerability disclosure policy is the difference between researchers reporting to you (where you can fix quietly) and reporting publicly (where you find out from social media). Setting up the policy properly is one of the highest-leverage security investments a company can make.

What public-facing disclosure infrastructure looks like:

Public-facing disclosure infrastructure is the cheapest part of the program and the most consequential. The cost is a few hours of setup; the benefit is that vulnerabilities reach you instead of social media.

Triage

Reports arrive. The next question is what happens to them. A program that solicits reports but takes weeks to respond loses the trust of the research community. The triage process is what turns the policy from a marketing artifact into a real security mechanism.

Quality of triage matters more than speed. A fast but inaccurate triage that mis-categorizes a critical issue as low is worse than a slower triage that gets it right. The team has to be technically competent, not just responsive.

Avoid

The fastest way to destroy a vulnerability disclosure program is to mistreat the researchers reporting to it. The behaviors to avoid are well-known and the cost of falling into them is permanent reputation damage.

A vulnerability disclosure policy is one of those investments where the operational discipline matters as much as the technical setup. Nova AI Ops integrates with the disclosure intake (security.txt URL, dedicated email, submission form), tracks SLA compliance per report, and surfaces the program's response-time metrics so the security team knows whether their reputation in the research community is being earned or burned.