Vulnerability Disclosure Policy

Huddle01 Cloud is operated by Graphene 01 Inc.

Our Commitment

Our Commitment

At Huddle01 Cloud, we take security seriously and we value the contributions of security researchers who help us keep our platform and users safe.


If you believe you've discovered a security vulnerability in our systems, we encourage you to report it to us responsibly. We commit to working with you to understand and resolve the issue promptly.

We’re here to make high-performance cloud compute radically efficient, transparent, and accessible to every builder. Bare-metal power at cloud scale, engineered for speed and affordability.

How to Report

How to Report

Email: support@huddle01.com


For sensitive reports, you may encrypt your message using our PGP key:

https://console.huddle01.com/.well-known/**pgp-key.txt

Email: support@huddle01.com


For sensitive reports, you may encrypt your message using our PGP key:

https://console.huddle01.com/.well-known/**pgp-key.txt

Email: support@huddle01.com


For sensitive reports, you may encrypt your message using our PGP key:

https://console.huddle01.com/.well-known/**pgp-key.txt

Email: support@huddle01.com


For sensitive reports, you may encrypt your message using our PGP key:

https://console.huddle01.com/.well-known/**pgp-key.txt

What to Include

What to Include

To help us triage and respond quickly, please include:

  • Description of the vulnerability and its potential impact

  • Steps to reproduce or proof-of-concept code

  • Affected systems (URLs, API endpoints, services)

  • Your assessment of severity (Critical/High/Medium/Low)

  • Any supporting materials (screenshots, logs, videos)

  • Your contact information for follow-up

What to Expect

What to Expect

Acknowledgment

Acknowledgment

Acknowledgment

Within 3 business days

Within 3 business days

Within 3 business days

Initial assessment

Initial assessment

Initial assessment

Within 10 business days

Within 10 business days

Within 10 business days

Status update

Status update

Status update

At least every 14 days until resolved

At least every 14 days until resolved

At least every 14 days until resolved

Resolution

Resolution

Resolution

Depends on severity and complexity

Depends on severity and complexity

Depends on severity and complexity

We'll keep you informed throughout the process and notify you when the vulnerability has been remediated.

Scope

Scope

In Scope

In Scope

  • huddle01.cloud and *.huddle01.cloud

  • Huddle01 Cloud API (api.huddle01.cloud)

  • Huddle01 Cloud Dashboard and web applications

  • Authentication and authorization systems

  • Network isolation between tenants

  • Data exposure or leakage vulnerabilities

Out of Scope

Out of Scope

The following are not eligible for this program:

  • Attacks requiring physical access to user devices

  • Social engineering (phishing, vishing, etc.) against Huddle01 employees or users

  • Denial of Service (DoS/DDoS) attacks

  • Attacks against third-party services we use (report to them directly)

  • Vulnerabilities in customer applications hosted on Huddle01 Cloud

  • Attacks requiring compromised user accounts (unless demonstrating an escalation)

  • Automated scanning output without demonstrated impact

  • Missing security headers without demonstrated exploit

  • SSL/TLS configuration issues without demonstrated exploit

  • Clickjacking on pages with no sensitive actions

  • CSRF on logout or other low-impact actions

  • Email spoofing (SPF/DKIM/DMARC configuration)

  • Vulnerabilities in outdated browsers or plugins

  • Content injection without demonstrated impact

Rules of Engagement

Rules of Engagement

To ensure a safe and legal research process, we ask that you:

Do:

  • Act in good faith and avoid privacy violations, data destruction, or service disruption

  • Only interact with accounts you own or have explicit permission to test

  • Stop testing and report immediately if you access user data

  • Give us reasonable time to resolve issues before any public disclosure

  • Use the minimum access necessary to demonstrate the vulnerability

Don't:

  • Access, modify, or delete data belonging to other users

  • Perform actions that could harm the availability of our services

  • Use automated tools that generate significant traffic

  • Publicly disclose vulnerabilities before we've had time to address them

  • Engage in extortion or threats

Safe Harbor

Safe Harbor

We consider security research conducted in accordance with this policy to be:

  • Authorized under the Computer Fraud and Abuse Act (CFAA) and similar laws

  • Exempt from DMCA restrictions on circumvention of security measures

  • Lawful and conducted in good faith

We will not pursue legal action against researchers who:

  • Follow this policy and act in good faith

  • Avoid privacy violations and data destruction

  • Do not exploit vulnerabilities beyond what is necessary to demonstrate them

  • Report findings to us before any public disclosure

If legal action is initiated by a third party against you for research conducted under this policy, we will make it known that your actions were authorized.

Recognition

Recognition

We believe in recognizing the efforts of security researchers who help us improve.

  • Hall of Fame: With your permission, we'll acknowledge your contribution on our security page

  • Reference letter: Upon request, we can provide a reference letter confirming your responsible disclosure

Note: We do not currently offer monetary rewards, but we deeply appreciate your contributions to keeping Huddle01 Cloud secure.

Exclusions

Exclusions

The following will disqualify a submission:

  • Violations of this policy

  • Disclosure of vulnerabilities before resolution

  • Submission of vulnerabilities already known to us

  • Submission from automated scanners without analysis or verification

  • Threatening or coercive behavior

Questions?

Questions?

If you have questions about this policy or want to check whether specific research is in scope, contact us at security@huddle01.cloud before beginning your research.

This policy is inspired by industry best practices and disclose.io standards.

Last updated: January 2026

Have questions? Connect with us

Have questions? Connect with us