Coordinated vulnerability disclosure

If you have identified a potential security vulnerability, we ask that you:

  1. Refrain from exploiting the vulnerability beyond what is necessary to demonstrate its existence.
  2. Avoid accessing, modifying, or deleting data that does not belong to you.
  3. Report the vulnerability directly to us at informationsecurity@railinnovators.group
  4. Provide sufficient details to reproduce and validate the vulnerability (e.g., URLs, steps to reproduce, screenshots, or scripts).