Responsible Disclosure & Security Policy
Outpacr B.V.
Contact
If you have found a vulnerability or security issue in one of our systems or services, please contact us directly via:
E-mail: security@outpacr.com
PGP: see key below
Phone: +31 85 212 9463
At Outpacr, we take the security of our systems and our customers' data extremely seriously. Despite our best efforts, a vulnerability may still be present. If you discover a security vulnerability, we encourage you to report it to us as quickly as possible so we can take immediate action.
How to Report a Vulnerability
We ask you to share your findings by sending an email to security@outpacr.com.
Policy
We ask that you observe the following when reporting a vulnerability:
Do not use the information for any purpose other than reporting.
Do not misuse the issue or cause any damage.
Provide sufficient details to reproduce the issue.
We will confirm receipt within 72 hours and keep you informed of our progress and resolution.
Please include the following information in your report:
A detailed description of the vulnerability and its potential impact.
Sufficient information to reproduce the vulnerability (e.g., the URL, a proof-of-concept, or screenshots).
Your contact details (name and/or email address) so we can get in touch with you.
What You Can Expect From Us
We will send a confirmation of receipt within 2 business days.
We will start our investigation immediately and keep you informed of our progress.
We will not take any legal action against you, provided you act in good faith and follow these guidelines. This is our safe harbour statement.
We will resolve the vulnerability as quickly as possible.
We greatly appreciate your help in keeping our systems secure.
Vulnerabilities may relate to our website, APIs, or software products under outpacr.com or its subdomains.
Our Commitment to Security
At Outpacr, security is an integral part of our operations. To respond effectively to potential threats, we have established and maintain a formal Internal Incident Response Plan. This plan governs our actions from the moment an incident is detected, ensuring prompt analysis, containment, and resolution. This structured approach enables us to act decisively to protect our systems and our customers' data.
Canonical Validity
This document is the HTML representation of our security.txt policy. Canonical version:
https://outpacr.com/.well-known/security.txt
Last updated: 2025-10-13
Expires: 2026-10-12
PGP Public Key
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQINBGjuQxsBEAC/bzDadfgTim63nQVU5KBKdnJlbVMT480HYqTm279klz1BtWcJ BQUegOpNkAnsaKpP2HXibMwHBVnbdvvD000pT74B+yrbSH4C0im65nAMkeNFL9mx UzOpX203hAjre0ojRJKyohLqHns0D3miT4y8Opqt0bCTUrjZNSzaco5O+rq1haYM XI+J1TxA9za00/EB7wergSgYpIysg2sMRnweWI8bzX47Hq/lSFCawxqWQ2U0bvp6 Dd1BCXpX7+wKj/osuepyoFINfCvMMET7gOqi7qXzlrVrVpbMpWULJIfmKf08Umhm Ce9EatemwJkH9PYMUU8sIti2fm5yUR5Wf7jToz/6rCadHyZ2hx9yXMXBrFzUzXSt Lw0L5KRDApTQ5TOqK1Vk9wtP8Tzu8R9BGSU0WQVdnkGFzUMTOWn0hNVLDOpfIn+a WM1aegWvnY2wsDk2bfER43VIbaBetkqX95WTUZML3wCGPtw0GFOJ59EhDVN4Ugjq s9PbH0o5vNeDT/kohLO4PuMJw3u3UHyrLV2bTUXRLxIdYyHpVsCQ91UMMkyICWoZ tNjTjxJ0tSQtFdsOky8/chqsT+8MPpdJM37B8MNdrMeGVLYRETa/xJSugQ3n94d1 8NhUQDvN6DyN9K5K8dEyimQiDotZl5Ri6SSdkKEc1ucdOdZ2mYwfgoQ8nwARAQAB tCpCYXJ0IHZhbiBNYWFyc2V2ZWVuIDxzZWN1cml0eUBvdXRwYWNyLmNvbT6JAlQE EwEIAD4WIQSLQ3I3kPZmjHOcGLVyYzpWVkNbkgUCaO5DGwIbAwUJB4YfRwULCQgH AgYVCgkICwIEFgIDAQIeAQIXgAAKCRByYzpWVkNbkoj/EACOdHJNRzHwzIi1v5jc tp3hN1amY2IO5rwSclXgaZuF0FUqHCXzC0xfNfD9CdCvFhDkRz0gROfq+eQfmqSu bBjd7xFQKBOdfAATyb1xb5Q3FQexIampq481u6kiYZmTbu3nCSXZzJkDuaR+UMB6 hF85FPvi9NGPltyfQ/41QfVcFzeIJn+BePve2maPnAaMn9Qds1xPY9UzfLwYmxGX 1NnlmW3FcSV/lb1q9D9P9i0QSxg+sYrJY9/+Ht6Z7RSkNLB1Yj68WEFtYbAVUBNq 81imC23aoKJI2swoJ/GiSN42GqQqKyvl2jZPghYEZ5a/+2ipIMJjkQxrJY+heO9r oRZTy6xwjMjt6xGx12h4QChq/HXuLF4cQisFcD+zo4tYGPwWO2cDDkFmA29EG1rm UPb4sp12MuNDA21xK9+ZQuOq9Rer5v2GpGiZ1iGiNZihk+H3B2eSsAUFkxYqvLe8 KVaGcRjo3PXbHuOg0JFD8thIk40ISRyXXOZpJhX2icTYf77ExyiNRp4kD4DN0UOT t//fL9sMDovZc/FCG7/xAocEgZh3CSEGJX+7Mv9LOTU85a1UdjX+6GdFerqbpQak zS310wmaEOmSU+FH85yifsPklW8V99ux6oEOWbIe3aU2H+TrATHYjfXPvmkip4rM 79QIt+L05GtlW8KOcLHBxA1R2bkCDQRo7kMbARAAsbTwNdJmCA/P9blPhIAG4hFs IQE05214p8AUcpfdxgRfQj+4VYy62hCdUjUVqHamh3Orruh2ROyyzEMsRVx2piXL LuGaeT+ktx78QVRA2HZYyIwB0pyr/opymynaoXZKdAAMAw4iH3g26Ge9AHnmJ94h vf5oyhtyqtjgfYtjXc3UJhZw7nH0GdEaI8kuM1Azy0aggkYDeesFHI1YSMGbeYfx f+MStRh9YikCfg2XrQRiixxwUhqLltEx2ITI/hmS4XizWsZVzFAuSBkBjPpD2e+X WCYgE7kJoLtrvlTAKwNxNTFPBBYZ0ktPJsQl6B76Ht5D8wWnCp20/b/Q2SmtE4mh m7wOEBvDY+QzVbH2fNBQaJ+hFAqBauhEdJ87xJEfPKvAzMonSihuJWBnuSlaLfWD z2ihJzNzzT/afkFJMXuTdryDy8wkdSaI5KfV+Y5GedifJaVLB9moudSSu0zZpTrp iFlUzpmDi4fthKCLvwiXyaH5XF9HswQI4YWD22X7MGR1JDa8Njn767/DziRxu/Rp 5aqu1UxtOGVZ+cXBikDJv6rxQaPkp8aY+pJWOWpBEiMHRl13ZrUeaakgWKPjaDW4 C1iNj695KFi3AXcxYOEO1pFj+yaHzwWLfzkn6P8+/KfMBttdoyljCD+8mB7NETTn MjwonOJoQYAdTyxqu20AEQEAAYkCPAQYAQgAJhYhBItDcjeQ9maMc5wYtXJjOlZW Q1uSBQJo7kMbAhsMBQkHhh9HAAoJEHJjOlZWQ1uShIsP/2gD8GpQHw8TNPCNt2DK 391RIc8zzze0fR8UEPDLA123m6ybKUdBLM9DwKNPrwh2xK7XiWUVGCUPKHxhty4o jcWmY3K0v2onzjhUMnCXKIpDW0cHUcr9owj5Yj1TZUUA7ZjMYxIvXlTucrRqjAM2 eIr3WHzyYsWcdNeZ3sdsNkkhEDY7ei4bL/e0rsUo+evwgjyoAjCs6rhG2qnTInjJ ar0BNSKwGu/cDw5NAWk+e/r/OD5YhKYn1jpeIMSkr/yA4BKEBEy5hV6nGhVyNHbX gjcJw6kkOjKOiCZMJ+1M/pTdmJjPEXBdDuXJSzHMi4oV3O0yl20NdCxGToW1KD2p FnG82tqrvpRhVYLz5TSbZl1RsUX9gk7Dn60SOn8o/1Qv6M/9LNTVY2GESFXolJAk zv0IfXfnF+x+3CvHc87hYkj0uSeP7+meZPUpBfewZ6B9WFBgEYFZwSIaUH8DSNos L/CLgDaD4t4r5hgBHdZBRK/vJj8G2ktvybu7Z9ZU9A4g8kDDtxOaOzZA4x59ChU+ OLqUb5SEkrJfcDG5iSm45eN7G4+/aE/YovXH1/evkcarKzW25SH27mCOpS7r65uj 8NM7GgB6RAyYpkSgwJWfjZjolfDJ8g+OddJiN7P/o2fCeUQ96vQiHaxaLiFU31+ jfmpGTmiSRhCKf9h8JrU/Ul+ =n0tC
-----END PGP PUBLIC KEY BLOCK-----
Processing of Reports
ll reports are registered in our internal MTL incident log. Critical findings are escalated to management within 72 hours and, if necessary, reported to the National Cyber Security Centre (NCSC-NL).
2025 Outpacr B.V.
*No commitments, just valuable insights