Coordinated vulnerability disclosure
If you have identified a potential security vulnerability, we ask that you:
- Refrain from exploiting the vulnerability beyond what is necessary to demonstrate its existence.
- Avoid accessing, modifying, or deleting data that does not belong to you.
- Report the vulnerability directly to us at informationsecurity@railinnovators.group
- Provide sufficient details to reproduce and validate the vulnerability (e.g., URLs, steps to reproduce, screenshots, or scripts).