Disclosure Program
Permission-driven outreach for organizations showing public indicators of misconfiguration, data leakage,
or automated abuse.
We request explicit authorization before any targeted validation.
We scope, validate, and report with minimal impact and strict boundaries.
Our research team identifies public design patterns that commonly correlate with data exposure, automation abuse, or competitive intelligence risk. Our security advisement team reviews the concern and prepares a one-time investigation request through our disclosure program.
- Direct contact to your designated owner
- Clear impact, reproduction, mitigation
- Sensitive-content minimization
Our Business
RedMINT Security LLC maintains a "disclosure as a business" model. We openly pursue client acquisition through security, intelligence, and development services to clients satisfied with our disclosure process.
Our Pursuit
We maintain a permission-first disclosure process for public websites and infrastructure with designs suggesting data exposure, automation abuse, or competitive intelligence risk.
Our Approach
Our research team's automated risk assessment system passively identifies risky or vulnerable infrastructure through a non-interactive, one-time evaluation using high-level heuristics to identify matters for internal human review. These checks are limited to what is already publicly reachable, and RedMINT does not retain response data in our systems at this stage.
Our Outreach
RedMINT Security Advisement opens a disclosure case and requests written authorization for a defined review of the relevant public-facing surface. Initial identification, preliminary review, and initial disclosure outreach are conducted without upfront charge.
Initial identification
Passive one-time access checks and heuristics may be used to identify a matter for internal review. These checks are limited to publicly reachable conditions and are not retained as investigative records.
Case opening
A case may be opened only after human review by our security advisement team determines that outreach is warranted.
Authorization standard
No targeted validation or automated case-specific research is conducted unless written authorization is received for a defined public-facing scope.
Commercial terms
Initial scans, preliminary review, and first disclosure outreach are not billed upfront. Paid work begins only if expanded services are later requested and agreed.
Disclosure
disclosure@redmintsecurity.com
How to Respond
Your security or engineering contact, and either your permission intent or an available time and date for a phone or video call.
We understand and encourage the presence of legal counsel or a designated representative.