http://gmtdse4aaofwifyz3xbnetqvj5zbevfcwbsprb67kpu2tz7iijegbvid.onion/vulnerability-disclosure-policy
Do not use an exploit to compromise or exfiltrate data, establish persistent command line access, or use the exploit to pivot to other systems. Provide us a reasonable amount of time to resolve the issue before you disclose it publicly. Do not submit a high volume of low-quality reports. Once you’ve established that a vulnerability exists or encounter any sensitive data (including personally identifiable information, financial information, or proprietary information or trade secrets of any...