We attach great importance to security issues and welcome all security researchers to report potential security vulnerabilities to us to improve the security of our products and services.

Incident Response

Vulnerability Response and Disclosure Process

Verification

 

 

 

 

Verify the vulnerability and confirm the exploitability and impact

Solution Development

 

 

Provide effective fix solutions or risk remediations measures

Affected Scope Confirmation

 

 

Investigate and confirm the complete scope of affected products

Release SA

 

 

 

Review and publish the security advisory for the security vulnerability

Recipient

 

 

 

 

Monitor and and assign received vulnerabilities in a timely manner