Virovici

Legal

Responsible Disclosure

Effective April 14, 2026 · Virovici LLC

1. Overview

Virovici LLC ("Virovici," "we," or "us") takes the security of our systems seriously. If you believe you have identified a vulnerability in any Virovici-operated system, we encourage you to report it to us before disclosing it publicly. We will investigate all credible reports and work to remediate confirmed issues in a reasonable timeframe.

2. Scope

The following systems are in scope for this policy:

  • virovici.com and all associated subdomains
  • Client-facing infrastructure directly operated and controlled by Virovici

If you are unsure whether a system falls within scope, err on the side of reporting and we will clarify.

3. Out of Scope

The following are explicitly out of scope and must not be tested:

  • Social engineering of Virovici personnel or clients
  • Physical security attacks against Virovici or its clients
  • Denial-of-service or resource exhaustion attacks of any kind
  • Automated scanning without prior written authorization
  • Attacks against client systems that are not operated by Virovici
  • Vulnerabilities in third-party software or services that we do not control

4. How to Report

Send your report to [email protected] with the subject line "Security Disclosure." Please include as much detail as you reasonably can:

  • A description of the vulnerability and its potential impact
  • Steps to reproduce, including relevant URLs, request/response examples, payloads, or screenshots
  • Your name or handle if you would like to be acknowledged (entirely optional)

We do not currently operate a paid bug bounty program. We do recognize good-faith researchers and will acknowledge your contribution publicly if you wish.

5. Our Commitments

When you report a vulnerability in good faith under this policy, we commit to:

  • Acknowledging receipt of your report within three business days
  • Providing an initial assessment within ten business days
  • Keeping you reasonably informed of remediation progress
  • Not pursuing legal action against you for research conducted within the bounds of this policy
  • Treating your report and contact information as confidential

6. Good Faith Guidelines

We ask that researchers:

  • Allow us reasonable time to investigate and remediate before any public disclosure
  • Avoid accessing, modifying, exfiltrating, or destroying data that does not belong to you
  • Limit testing to what is necessary to confirm the existence of a vulnerability
  • Not exploit the vulnerability beyond what is minimally necessary to demonstrate it

7. Contact

Security reports and general inquiries may be sent to [email protected].