Skip to content

update link with new .asc.txt file #271

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions security/reporting-a-vulnerability.mdx
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
---
title: "Reporting a Vulnerability"
description: "Turnkey highly values the security of our software, services, and systems and we actively encourage the ethical reporting of any security vulnerabilities discovered. We invite researchers and users to report potential security vulnerabilities to our Bug Bounty Program via the form below, or to us via email at [[email protected]](mailto:[email protected]). When submitting a report via email, please provide a thorough description of the vulnerability, including steps to reproduce it and its potential impact."
mode: wide
mode: "wide"
---

If you believe you have found very serious vulnerability, we ask that you encrypt the message to the `security.turnkey.com` PGP key (FP: `AD6C 3E61 17A5 886E 550E F8BB 3ACD E5EA 8DC7 9275`). This can also be found on Turnkey's website at `https://www.turnkey.com/.well-known/security.asc`
If you believe you have found very serious vulnerability, we ask that you encrypt the message to the `security.turnkey.com` PGP key (FP: `AD6C 3E61 17A5 886E 550E F8BB 3ACD E5EA 8DC7 9275`). This can also be found on Turnkey's website at [**https://www.turnkey.com/.well-known/security.asc**](https://www.turnkey.com/.well-known/security.asc)

Upon receiving a report, our team promptly assesses and prioritizes the vulnerability based on its severity and potential impact. We then take reasonable and appropriate steps to mitigate and remediate the identified risks in accordance with our internal policies and timelines. Where feasible, we will endeavor to keep the reporter informed throughout the process. Our approach is designed to ensure confidentiality and offer safe harbor to researchers, promising that those who report vulnerabilities ethically and in good faith will not face legal action.

Expand All @@ -16,4 +16,4 @@ For further inquiries or more information about our program, please contact our

Use the form below to directly submit vulnerabilities for triage and evaluation as part of our bug bounty program.

<iframe allow="clipboard-read; clipboard-write" src="https://bugcrowd.com/a9e1eca7-990e-4602-bf6d-a9f70df1c2fa/external/report" title="Security vulnerability submission form" id="bugcrowd-external-submission-form" scrolling="no" referrerpolicy="origin" width="100%" height="2500px"></iframe>
<iframe allow="clipboard-read; clipboard-write" src="https://bugcrowd.com/a9e1eca7-990e-4602-bf6d-a9f70df1c2fa/external/report" title="Security vulnerability submission form" id="bugcrowd-external-submission-form" scrolling="no" referrerpolicy="origin" width="100%" height="2500px" />