Security.txt and reporting channel
Use the published security.txt file and the existing security contact for vulnerability reporting or coordination.
This page explains how Eresus handles security reporting, responsible disclosure, pentest methodology, AI security validation, and evidence-first deliverables without decorative trust claims.
Use the published security.txt file and the existing security contact for vulnerability reporting or coordination.
We prefer responsible disclosure, timeline alignment, and evidence handling that does not increase downstream risk.
Web, API, cloud, identity, and external attack paths are scoped around exploitability, business impact, and remediation clarity.
We validate prompts, agents, MCP servers, tool boundaries, model intake, RAG leakage, and release-risk decisions with adversarial workflows.
Every deliverable is built around proof-of-exploit, impact, remediation direction, retest notes, and executive-readable closure guidance.
Advisories, press references, release notes, open-source artifacts, and dated research writing remain the public proof system.
Instead of publishing a fake sample badge, we show the layers buyers and engineers should expect in a real deliverable.
Scope and rules of engagement
Attack narrative and reproduction path
Business impact and exploitability summary
Developer remediation guidance
Retest notes and closure state
Press, advisories, release notes, and security.txt are treated as direct trust signals instead of decorative marketing surface.