ZERO|TOLERANCE Security Research ("ZT") is an independent security research firm that conducts proactive, external reconnaissance of internet-facing infrastructure to identify security exposures before they are exploited by malicious actors.
These guidelines define the principles, methodology, and procedures ZT follows when discovering and disclosing security findings to affected organizations. This policy applies to all research conducted by ZT personnel and governs all communications with affected parties from initial discovery through final resolution.
The objective of this policy is to ensure that security findings are communicated responsibly, that affected organizations receive adequate time and support to remediate, and that the interests of end users and third parties are protected throughout the process.
All ZT research is conducted through external observation of, and standard interaction with, publicly accessible and unauthenticated systems and information. ZT does not require or use any special access, credentials, or insider knowledge. As a baseline, ZT adheres to the following constraints:
Limited Validation Exception. In narrowly defined circumstances, ZT may depart from the baseline constraints above. Where initial external observation reveals a critical exposure that poses immediate risk to identifiable individuals — such as plaintext credentials accessible without authentication — ZT may conduct limited validation testing, restricted to the minimum interaction necessary to confirm severity and impact. Validation is performed only when passive observation alone is insufficient to establish the nature and scope of the risk. Any validation steps taken are documented transparently in the disclosure report delivered to the affected organization. Limited validation does not extend to lateral movement, privilege escalation, data exfiltration beyond what is necessary to evidence the finding, or any action that could cause harm to the affected organization or its users.
This methodology is consistent with widely accepted norms for good-faith security research as described by the U.S. Department of Justice's 2022 policy on charging cases under the Computer Fraud and Abuse Act, the CERT/CC vulnerability disclosure guidelines, and ISO 29147 (Vulnerability Disclosure).
When ZT identifies a finding of sufficient severity to warrant disclosure, ZT will:
ZT follows a 90-day coordinated disclosure window beginning from the date of initial notification. This window is consistent with industry standards established by Google Project Zero, the CERT Coordination Center (CERT/CC), and other respected disclosure frameworks.
During this window:
Extensions. ZT will grant reasonable extensions to the 90-day window when the affected organization demonstrates active, good-faith remediation efforts and communicates openly about timelines and obstacles. Extension requests should be made in writing before the window expires.
Early disclosure. ZT reserves the right to shorten the disclosure window if there is evidence that the vulnerability is being actively exploited in the wild, that the organization is acting in bad faith, or that continued non-disclosure poses an imminent risk to public safety or to affected third parties. Before invoking early disclosure, ZT will notify the affected organization and provide a reasonable opportunity to respond, except where delay would result in imminent harm to identifiable individuals.
ZT offers remediation verification to all notified organizations. Once an organization reports that remediation is complete, ZT will:
An initial verification pass is offered as part of the coordinated disclosure process. Comprehensive remediation validation, ongoing monitoring, and extended assessment services are available under separate engagement terms. Remediation verification follows the same external-observation methodology described in Section 2.
If an affected organization does not respond to or engage with ZT's initial notification, ZT will escalate as follows:
| Timeline | Action |
|---|---|
| Day 7 | Follow-up communication to the original point of contact, reiterating the finding and requesting acknowledgment. |
| Day 14 | Escalation to senior security leadership (CISO or equivalent) through an alternate communication channel if necessary. |
| Day 30 | If the finding involves material risk to identifiable third parties, ZT may notify those third parties directly, limited to information necessary for them to assess and mitigate their own risk. |
| Day 60 | If the finding involves exposures that may trigger regulatory notification obligations, ZT may notify relevant regulatory or coordinating authorities. |
| Day 90 | Public disclosure of the finding. ZT will publish a technical summary of the vulnerability, remediation recommendations, and a timeline of disclosure communications. |
All timeline references are measured from the date of initial notification. Each escalation step is subject to the good-faith extension provisions described in Section 4. The escalation protocol applies when an affected organization has not acknowledged or meaningfully engaged with the disclosure. Organizations that are actively communicating and demonstrating good-faith remediation efforts are governed by the standard 90-day window and extension provisions in Section 4.
Security findings sometimes reveal risk that extends beyond the notified organization to its clients, partners, vendors, or end users. ZT recognizes a duty of care toward these third parties.
If ZT's findings indicate that identifiable third parties face material security risk as a direct consequence of the discovered vulnerability, and the primary organization fails to demonstrate adequate remediation progress or to notify affected third parties within a reasonable period, ZT reserves the right to:
ZT will always prefer to work with the primary organization to handle third-party notification jointly. Direct third-party notification is a measure of last resort, employed only when continued non-action poses an unacceptable risk to parties that have no other means of learning about the exposure.
ZT treats all findings as confidential from the moment of discovery. During the coordinated disclosure window:
Following the expiration of the disclosure window, if the affected organization has not remediated the finding and has not engaged in good-faith communication, ZT may publish a disclosure report. Published reports will include technical details sufficient for the security community to understand the nature of the vulnerability and recommended mitigations. ZT will make reasonable efforts to avoid including information that could directly enable exploitation.
If the affected organization successfully remediates the finding during the disclosure window, ZT will coordinate with the organization on the timing and content of any public acknowledgment, and will credit the organization's responsive handling where appropriate.
ZT maintains internal records of all disclosed findings, including report contents, delivery confirmations, correspondence, and remediation outcomes. These records are retained to support traceability, demonstrate good-faith conduct, and enable follow-up if issues resurface or remain unaddressed.
Retained records consist of ZT-authored reports, delivery confirmations, and correspondence logs, and do not include data belonging to the affected organization, its clients, or its users. These records are stored securely and are not shared with any party outside of ZT unless required by law, compelled by legal process, or necessary to support the provisions described in Sections 6 and 7 of this policy.
All reports, analyses, and supporting materials produced by ZT in connection with security research and disclosure are the exclusive intellectual property of ZERO|TOLERANCE Security Research. This includes, without limitation, written findings, severity assessments, remediation guidance, methodology descriptions, and any supplemental materials delivered to affected organizations or their designated recipients.
These provisions apply to all parties who receive, handle, or transmit ZT reports, including intermediaries, delivery agents, and designated points of contact acting on ZT's behalf.
ZERO|TOLERANCE Security Research
Encrypted communication via PGP/GPG preferred for all disclosure-related correspondence.
PGP Fingerprint: 7171 FB9C 2AEA 69B9 FE4F 053F 7BD7 1863 418D C1BE
| Version | Date | Summary |
|---|---|---|
| 1.6 | March 24, 2026 | Added Limited Validation Exception to Section 2 (Discovery Methodology), defining conditions under which ZT may conduct minimal validation testing when passive observation alone is insufficient to establish the severity of a critical exposure affecting identifiable individuals. Updated Section 5 (Remediation Verification) to clarify that initial verification is included, with comprehensive services available under separate terms. Updated Section 8 (Legal and Ethical Framework) to distinguish between unsolicited disclosure, bug bounty participation, and contracted work. Updated Section 9 (Confidentiality) to permit proposing professional services while maintaining prohibition on competitive intelligence use. |
| 1.5 | March 23, 2026 | Added Section 10 (Report Retention and Record-Keeping) and Section 11 (Report Ownership and Intellectual Property) covering attribution, prohibited rebranding, redistribution controls, and traceability provisions. Contact renumbered to Section 12. |
| 1.4 | March 23, 2026 | Updated discovery methodology to accurately reflect external observation and standard interaction with unauthenticated systems. Added legal framework references to Section 8. Clarified escalation protocol scope. Added early disclosure grace period. Added CERT/CC coordination reference. |
| 1.3 | January 1, 2026 | Refined discovery methodology section. Added ISO 29147 and DOJ CFAA policy references. Clarified early disclosure provisions. |
| 1.2 | October 15, 2025 | Added third-party notification provisions and confidentiality framework. |
| 1.1 | July 1, 2025 | Expanded escalation protocol. Added remediation verification offer. |
| 1.0 | March 1, 2025 | Initial publication. |