Chaser Systems are committed to protecting Cloud environments from emerging threats and invites security researchers to find vulnerabilities in the function of any of its products.
If, as a researcher, you have discovered a vulnerability, please send to us at firstname.lastname@example.org :
- Deployment Environment details
- Product Version details
- Vulnerability impact
- Method to demonstrate the claimed vulnerability
Although we do not run a bug-bounty program, we will endeavour to acknowledge your findings and ship a patched version of our product at the earliest.