CIPHERCUE

Published 2026-04-28 — v1.0

Coordinated disclosure policy

CipherCue operates a continuous external observation programme. When an observation indicates a catalogued security issue against an organisation's publicly-exposed software, we attempt to notify that organisation before exposing the observation on any CipherCue customer surface. This page specifies the scope, timing, channels, and commitments of that process.

48-hour silent window. Every new pre-disclosure observation is held silent for 48 hours while we attempt responsible disclosure to the affected organisation. Customer-facing surfaces reflect the observation only after that window expires or after the organisation acknowledges disclosure, whichever comes first.

Scope

This policy covers observations CipherCue generates itself — principally KEV matches against observed fingerprints and suspected-incident patterns (e.g. emergency certificate rotation, unplanned DNS authority change, new exposed admin-path). It does not cover public authority records (e.g. state AG breach notifications, SEC 8-K Item 1.05, CISA KEV entries themselves): those are already public and are treated as authority-sourced fact, not CipherCue-originated observation.

Silent window

When a new pre-disclosure observation is recorded:

  1. A DisclosureAttempt record is created. The observation is tagged disclosed_at = null.
  2. CipherCue attempts to contact the target (see "Channels" below).
  3. 48 hours after the attempt — regardless of whether a response was received — the observation is released to customer-facing surfaces and disclosed_at is populated.
  4. If the target acknowledges and requests an extended window, we honour a single 14-day extension on written request.

Channels

In priority order:

  1. security.txt contact (RFC 9116). If the domain publishes a .well-known/security.txt and it contains a Contact: field, that is used.
  2. WHOIS abuse contact, where resolvable.
  3. security@{domain} as a fallback to the registered domain.

If none of the above resolves to a deliverable address (bounces, mailbox unknown), the 48-hour window still applies and the observation is released with contact_unresolvable = true. We make a best-effort attempt; we do not delay customer exposure indefinitely waiting on a non-existent mailbox.

Disclosure content

Our disclosure email is neutral and factual:

The email contains no embedded tracking, no link shorteners, no obfuscated URLs.

Standards alignment

Response commitments

Contact for coordinated disclosure

security@ciphercue.com is the single address for coordinated disclosure matters, including requests for extension and notices of remediation.

Not in scope for this policy

Changelog
v1.0 — 2026-04-28 — Initial publication. 48-hour silent window, three-channel contact resolution, standards alignment with CERT/CC, ISO/IEC 29147, FIRST.org, RFC 9116.