Skip to content

Security: Ciprian-LocalPulse/Sovereign-Operator-Stack

Security

SECURITY.md

SECURITY POLICY

Supported Systems

This security policy applies to all repositories and systems operated under:

Xolo Go OÜ — Ciprian-Stefan Plesca Registry: 14717109 · EU VAT: EE102156920 · Estonia


Reporting a Vulnerability

If you have identified a security vulnerability in any system under this practice, we ask that you follow responsible disclosure principles.

Contact

Email: contact@localpulse.pro Subject line: [SECURITY] Brief description — do not include full technical details in subject

What to Include

- System/repository affected
- Description of the vulnerability class
- Steps to reproduce (if applicable)
- Potential impact assessment
- Your contact details for follow-up

What to Expect

Timeline Action
Within 48 hours Acknowledgement of your report
Within 5 business days Initial assessment and severity classification
Within 14 days (Critical/High) Remediation plan communicated
Within 30 days (Medium/Low) Remediation timeline communicated
Post-remediation Credit offered (if desired)

Disclosure Policy

Please do not:

  • Publicly disclose the vulnerability before a fix is available
  • Use the vulnerability for any purpose beyond demonstrating it exists
  • Access, modify, or delete data that does not belong to you

We commit to:

  • Respond to all valid reports within 48 business hours
  • Not pursue legal action against good-faith security researchers
  • Provide credit for valid disclosures (if the researcher wishes)
  • Disclose the vulnerability publicly once remediated

Scope

In scope:

  • All public repositories under this GitHub profile
  • localpulse.pro and associated infrastructure
  • Any system explicitly listed as in-scope

Out of scope:

  • Social engineering attacks against the operator
  • Physical security
  • Denial of service attacks
  • Issues in third-party dependencies (report to the dependency maintainer)

Severity Classification

We use the CVSS 3.1 scoring system for severity classification:

Severity CVSS Score Target Remediation
Critical 9.0 – 10.0 7 days
High 7.0 – 8.9 30 days
Medium 4.0 – 6.9 90 days
Low 0.1 – 3.9 Next scheduled release

This security policy is maintained under the engineering doctrine of Ciprian Stefan Plesca / Xolo Go OÜ. Last reviewed: 2025

There aren’t any published security advisories