-Safe harbor is recommended by the U.S. Department of Justice in the [Framework for a Vulnerability Disclosure Program for Online Systems](https://www.justice.gov/criminal-ccips/page/file/983996/download) and the Cybersecurity and Infrastructure Security Agency (CISA) in the [Vulnerability Disclosure Policy Template](https://www.cisa.gov/vulnerability-disclosure-policy-template) for U.S. government agencies, championed by legal and infosec experts industry-wide in projects like the []#legalbugbounty standardization project](https://amitelazari.com/%23legalbugbounty-hof/f/legalbugbounty-standardization-project---adopt-a-safe-harbor) and [disclose.io](https://disclose.io/), and already provided by all top-tier security programs and generally most organizations running a vulnerability disclosure program. Examples of top-tier security programs across a variety of industries providing safe harbor include the [UK Ministry of Defence](https://www.gov.uk/guidance/report-a-vulnerability-on-an-mod-system), [General Motors](https://hackerone.com/gm?type=team), [John Deere](https://hackerone.com/john-deere?type=team), and the [United States Postal Service](https://hackerone.com/usps?type=team).
0 commit comments