Vulnerability Disclosure Policy

At Julius AI, the security and confidentiality of our data and intellectual property are of paramount importance. We are responsible for safeguarding not only customer data, but also our proprietary technologies and other intellectual property (IP). To maintain high standards of security and compliance, we welcome responsible vulnerability disclosures from security researchers, partners, and the general public.

Julius AI believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency and common good between Julius AI and Security Researchers. Together, our vigilant expertise promotes the continued security and privacy of Julius AI customers and services.

This Vulnerability Disclosure Policy outlines the processes for reporting vulnerabilities, including those that may affect our sensitive data and intellectual property. This policy applies to all systems, technologies, and intellectual property owned, operated, or maintained by Julius AI.

Julius AI accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers, and consultants. Julius AI defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability, or confidentiality of our services.

Guidelines for Responsible Disclosure

Scope

This policy applies to vulnerabilities found in:

Exclusions

The following activities are explicitly prohibited under this policy:

Legal Compliance

This policy does not authorize activities that violate applicable laws or regulations, including but not limited to:

Safe Harbor

When conducting security research in accordance with this policy, Julius AI:

If you're unsure whether your actions are covered, please contact us at security@julius.ai before proceeding.

Reporting a Vulnerability

Julius AI recommends that security researchers share the details of any suspected vulnerabilities across any asset owned, controlled, or operated by Julius AI (or that would reasonably impact the security of Julius AI and our users) using the web form below.

The Julius AI Security team will acknowledge receipt of each vulnerability report, conduct a thorough investigation, and then take appropriate action for resolution.