0 %

T&C

Security Disclosure Policy

Brand Design Ltd. welcomes responsible vulnerability disclosure. If you discover a security issue affecting branddesign.ltd, our client deliverables, or any infrastructure we operate, contact us via the channels below. We acknowledge reports within 48 hours and resolve valid issues within 30 days.

How to report

Email contact@branddesign.ltd with subject line "Security Disclosure". Include:

• A description of the vulnerability
• Steps to reproduce
• The affected URL or system
• Your preferred contact method for follow-up
(Optional) Your name or handle for public acknowledgement

Do not publicly disclose the vulnerability before we have had a reasonable opportunity to remediate it (30 days from acknowledgement, or sooner by mutual agreement).

Scope — in scope

This policy applies to:

branddesign.ltd and all its subdomains
branddesign.live (legacy domain, redirects to .ltd)
• All client websites where Brand Design Ltd. retains operational responsibility
• Public APIs we publish at /.well-known/openapi.json
• The free AI Audit tool at /ai-audit
• The chat widget and its backend at /chat-api.php

Scope — out of scope

The following are not eligible for vulnerability disclosure under this policy:

• Denial-of-service attacks or testing
• Social engineering of staff or clients
• Physical attacks on premises
• Issues in third-party services we do not control (Hostinger CDN, Google services, Anthropic API, etc.)
• Reports without reproducible proof-of-concept
• Vulnerabilities in third-party plugins or libraries we have not modified
• Automated scanner output without manual verification

What we commit to

Acknowledge the report within 48 hours of submission.

Investigate the issue within 7 days and confirm whether it is in scope.

Remediate valid vulnerabilities within 30 days (or communicate a clear extended timeline if the fix requires architectural changes).

Credit the reporter publicly on this page (if they consent) once the issue is resolved.

Safe harbour: we will not pursue legal action against good-faith researchers who follow this policy.

RFC 9116 — security.txt

Our machine-readable security disclosure file follows the RFC 9116 standard and is published at:

https://branddesign.ltd/.well-known/security.txt

This file allows automated security tooling to discover our vulnerability disclosure channels without manual lookup. It is verified valid by securitytxt.org and machine-readable for security agents.

Encryption (optional)

If your report contains sensitive information (production credentials, exploit payloads, etc.), you may request our PGP public key by email. We will respond with the key fingerprint within 24 hours.

Alternative: encrypted upload via https://files.branddesign.ltd/upload (on request).

Contact channels

Primary email: contact@branddesign.ltd
Phone: +359 877 57 00 79 (during EU business hours)
Languages: English, Bulgarian
Policy expiry: 2027-12-31T23:59:59Z (renewal review annually)
Canonical URL: https://branddesign.ltd/.well-known/security.txt

Past acknowledgements

No public vulnerability disclosures have been processed under this policy yet. As reporters consent to public credit, this list will be updated.

If you have submitted a report and we have not responded within 48 hours, please email contact@branddesign.ltd with subject "Security Followup".