Security Vulnerability Disclosure Policy
A comprehensive framework for security researchers, customers, and users to responsibly report potential security vulnerabilities
Introduction & Commitment
Factor House develops real-time data management tools including Kpow for Apache Kafka, Flex for Apache Flink, and the Factor Platform. We are committed to protecting our users' data and systems through responsible security practices.
This policy provides a framework for security researchers and customers to report potential vulnerabilities in Factor House products and infrastructure.
Reporting Vulnerabilities
Factor House encourages security researchers, customers, and the broader public to report any potential security vulnerabilities in a responsible manner. All vulnerability reports should be directed to our dedicated security email address:
We encourage detailed, human-verified reports with clear reproduction steps. Automated scanner outputs without specific context cannot be processed.
- Contact information: Your name, organisation, and preferred communication method
- Type of issue: Clearly identify the vulnerability category (e.g., XSS, SQL Injection, RCE, authentication bypass)
- Product and version/URL: Specify the exact Factor House product (Kpow, Flex, or Factor Platform) and precise version or affected URL
- Potential impact: Describe what data could be accessed, modified, or destroyed, and what services could be disrupted
- Step-by-step reproduction instructions: Provide clear, detailed instructions to reliably reproduce the issue
For security researchers, it would also be great if you could please include:
- Proof-of-concept (PoC): Include relevant code, scripts, screenshots, or videos demonstrating the vulnerability
- PGP encryption (Optional): For sensitive information, encrypt your submission using our PGP key (available upon request)
Scope
In-Scope Systems
- Kpow for Apache Kafka: Web UI, API, Docker images, infrastructure
- Flex for Apache Flink: Web UI, API, enterprise features, infrastructure
- Factor Platform: Unified platform, Web UI, OpenAPI 3.1 REST API
- Public-facing applications: Factor House-owned web applications, APIs, services
- Official Docker repositories: Container images on Docker Hub
Out-of-Scope
- Third-party services not directly controlled by Factor House
- Customer environments and deployments
Safe Harbor Protections
For good-faith security research conducted under this policy, Factor House provides:
- Legal Protection: Research considered authorized under applicable laws including Australian Cybercrime Act 2001 and international equivalents
- DMCA exemption: Circumvention necessary for legitimate security research
- Terms waiver: Limited waiver of conflicting Terms & Conditions
- Good faith recognition: Research considered lawful and helpful
Researchers must comply with all applicable laws. Contact [email protected] with legal questions before proceeding.
Response Process
- Acknowledgment: Receipt confirmed within 2-3 business days
- Investigation: Internal reproduction, impact assessment, engineering collaboration
- Updates: Regular status communication throughout process
- Remediation: Prioritized fixes based on severity and impact
- Resolution: Notification when vulnerability is resolved and deployed
- Recognition: Optional public recognition with researcher permission
Note: Factor House does not currently operate a monetary bug bounty program.
Disclosure Policy
We operate coordinated disclosure aligned with our SOC2 compliance:
- Researchers must provide reasonable notice before public disclosure
- Allow sufficient time for investigation, remediation, and deployment
- Reports containing customer data are not eligible for public disclosure
- Disclosure requests considered only after complete remediation via [email protected]
Contact
Email: [email protected]
Factor House reserves the right to update this policy. Check this page for the latest version.
This policy complies with Australian privacy and cybersecurity regulations while supporting global operations.
Last updated: 30.07.2025