Security
Responsible disclosure policy and security practices
Reporting a Vulnerability
If you discover a security vulnerability in any Void product or this website, we ask that you disclose it responsibly. Please report vulnerabilities to:
What to Include
- Description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Affected product and version (if applicable)
- Any proof-of-concept code or screenshots
Our Commitment
- We will acknowledge receipt of your report within 2 business days
- We will investigate and provide an initial assessment within 5 business days
- We will keep you informed of remediation progress
- We will credit researchers who report valid vulnerabilities (with your permission)
Responsible Disclosure Guidelines
- Allow reasonable time for remediation before public disclosure
- Do not access, modify, or delete data belonging to other users
- Do not degrade the availability of production services
- Do not use automated scanning tools against production systems without prior coordination
Product Security Practices
Void products are built with security as a core design principle:
- Written in Zig -- memory-safe by default with no undefined behavior in safe code paths
- TLS encryption for all inter-component communication
- JWT-based authentication with CSRF protection
- Role-based access control with audit logging
- No telemetry or data collection from customer environments
- Comprehensive test coverage across all components
Contact
For security inquiries: security@voidum.io
For general inquiries: sales@voidum.io