Lovex

Vulnerability Disclosure Policy

How to report a security vulnerability, what to expect in return, and the safe-harbor terms under which we operate. Companion to /.well-known/security.txt (RFC 9116) and to the broader posture at /trust.

Effective date: May 17, 2026

We welcome reports of security issues from independent researchers, customers, and anyone who runs into something that does not look right. This policy explains how to report, what we commit to in response, and the legal protections that apply when a researcher follows it. If a procurement reviewer is looking for the answer to “does this vendor have a documented VDP with safe harbor?” — this is it.

1. How to report

Email security@lovex.dev with as much detail as you can share without exfiltrating customer data. A useful report typically includes:

We do not currently publish a PGP key. If end-to-end encryption is a hard requirement for your disclosure, mention that in an unencrypted intro email and we will agree on a channel out of band.

2. What you can expect from us

Our commitments to a researcher who reports a finding in good faith:

3. Severity and target fix windows

We use CVSS 3.1 as the baseline for severity, adjusted up or down for context (data sensitivity, blast radius, exploitability in our specific architecture). Target timelines from confirmed triage to fix released in production:

These are targets, not contractual SLAs. If a fix is going to slip a target window, we will tell the reporter and explain why. Customer-specific contractual remedies live in the SLA and individual Order Forms.

4. In scope and out of scope

In scope:

Out of scope — testing the following is grounds for us to decline a report and is not covered by safe harbor:

5. Safe harbor

When a researcher follows this policy, we treat their testing as authorized and:

Safe harbor is conditioned on the researcher:

Safe harbor does not extend to actions taken before this policy was published, to researchers attempting to extort Lovex AB, or to anyone targeting individuals rather than the platform.

6. Coordinated disclosure

We default to coordinated disclosure: the researcher and Lovex ABagree on a publication date that gives us time to fix the issue and customers time to update. For most findings, that’s either the fix-release date or 90 days, whichever is earlier. We will not unilaterally extend an embargo beyond what is needed to ship a fix; researchers may publish if we miss the agreed date without explanation.

7. Changes to this policy

We may revise this policy as our infrastructure or process evolves. Material changes are announced on /trust and dated above. The policy in effect at the time a researcher submitted a finding is the one that governs that report.

8. Contact

Reports: security@lovex.dev

Mailing address: Lovex AB, Sweden. Full registered address available on request at security@lovex.dev.