This policy describes what systems and types of research are lined beneath this policy, ways to mail us vulnerability reports, and just how long we check with stability researchers to wait right before publicly disclosing vulnerabilities. We motivate you to definitely contact us to report opportunity vulnerabilities inside our methods.