Secure Contact Methods

Security Email

security@git.dev

Response within 24h

PGP Public Key

-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBF3K8p8BEADL8vJ2xZ9Q8fH3k9m2vR4wYzX5cD6eF7gH8iJ9kL0mN1oP2qR3sT4u V5wX6yZ7aB8cD9eE0fF1gG2hH3iI4jJ5kK6lL7mM8nN9oO0pP1qQ2rR3sS4tT5uU6vV7 wW8xX9yY0zZ1aA2bB3cC4dD5eE6fF7gG8hH9iI0jJ1kK2lL3mM4nN5oO6pP7qQ8rR9sS0 tT1uU2vV3wW4xX5yY6zZ7aA8bB9cC0dD1eE2fF3gG4hH5iI6jJ7kK8lL9mM0nN1oO2pP3 qQ4rR5sS6tT7uU8vV9wW0xX1yY2zZ3aA4bB5cC6dD7eE8fF9gG0hH1iI2jJ3kK4lL5mM6 -----END PGP PUBLIC KEY BLOCK-----

Submit a Report

Disclosure Guidelines

Scope

✓ In Scope
  • • git.dev & *.git.dev domains
  • • API endpoints & authentication flows
  • • CI/CD pipeline components
  • • Developer dashboard & CLI tools
✗ Out of Scope
  • • Social engineering / phishing
  • • DDoS or availability attacks
  • • Third-party integrations
  • • Public marketing websites

Response Process

We follow a structured workflow to ensure vulnerabilities are triaged, fixed, and disclosed responsibly.

1
Receive

Report logged & encrypted. Initial acknowledgment sent within 24h.

2
Triage

Security team validates impact, severity, and reproduction steps.

3
Remediate

Engineering deploys fix. Timeline shared based on severity.

4
Disclose

Coordinated public disclosure with researcher credit upon request.

Safe Harbor

🔒 Legal Protection for Researchers

.git will not initiate legal action, issue takedown requests, or pursue civil liability against researchers who report vulnerabilities in good faith and comply with our disclosure guidelines. We welcome ethical security research and encourage responsible disclosure. By submitting a report, you acknowledge that you will not exploit vulnerabilities, distribute findings publicly before resolution, or harm our users or infrastructure.

Copied to clipboard