From 3db1cf1fefaab54274d9c67450f8f5d7d482210b Mon Sep 17 00:00:00 2001
From: "mintlify[bot]" <109931778+mintlify[bot]@users.noreply.github.com>
Date: Tue, 8 Apr 2025 18:20:18 +0000
Subject: [PATCH] Documentation edits made through Mintlify web editor
---
security/reporting-a-vulnerability.mdx | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/security/reporting-a-vulnerability.mdx b/security/reporting-a-vulnerability.mdx
index 12e4fb95..80f4eafa 100644
--- a/security/reporting-a-vulnerability.mdx
+++ b/security/reporting-a-vulnerability.mdx
@@ -1,10 +1,10 @@
---
title: "Reporting a Vulnerability"
description: "Turnkey highly values the security of our software, services, and systems and we actively encourage the ethical reporting of any security vulnerabilities discovered. We invite researchers and users to report potential security vulnerabilities to our Bug Bounty Program via the form below, or to us via email at [security@turnkey.com](mailto:security@turnkey.com). When submitting a report via email, please provide a thorough description of the vulnerability, including steps to reproduce it and its potential impact."
-mode: wide
+mode: "wide"
---
-If you believe you have found very serious vulnerability, we ask that you encrypt the message to the `security.turnkey.com` PGP key (FP: `AD6C 3E61 17A5 886E 550E F8BB 3ACD E5EA 8DC7 9275`). This can also be found on Turnkey's website at `https://www.turnkey.com/.well-known/security.asc`
+If you believe you have found very serious vulnerability, we ask that you encrypt the message to the `security.turnkey.com` PGP key (FP: `AD6C 3E61 17A5 886E 550E F8BB 3ACD E5EA 8DC7 9275`). This can also be found on Turnkey's website at [**https://www.turnkey.com/.well-known/security.asc**](https://www.turnkey.com/.well-known/security.asc)
Upon receiving a report, our team promptly assesses and prioritizes the vulnerability based on its severity and potential impact. We then take reasonable and appropriate steps to mitigate and remediate the identified risks in accordance with our internal policies and timelines. Where feasible, we will endeavor to keep the reporter informed throughout the process. Our approach is designed to ensure confidentiality and offer safe harbor to researchers, promising that those who report vulnerabilities ethically and in good faith will not face legal action.
@@ -16,4 +16,4 @@ For further inquiries or more information about our program, please contact our
Use the form below to directly submit vulnerabilities for triage and evaluation as part of our bug bounty program.
-
+
\ No newline at end of file