ABOUT
LIST

Vulnerability Disclosure Policy

Safety Notice


/


Vulnerability Reporting

How to Report a Vulnerability

Report suspected vulnerabilities

Security researchers, industry organizations, customers and suppliers are encouraged to work with us and report security vulnerabilities related to Sunseeker  products and services.


Vulnerability reporting email

If you encounter or discover security issues in Sunseeker  products and services, please report them to us by sending an email to customer.support@sunseekertech.com.


Reporting email

Email: customer.support@sunseekertech.com

Note

Email subject line: Vulnerability name (for example, XXX product's XXX vulnerability)

The body text of the email can follow the format below, or you can choose the necessary information to send.


1. Name of the reporting individual or organization, and contact information

2. Vulnerability descriptions (vulnerability type and its threat)

3. Affected products and their versions

4. Technical details of potential vulnerabilities, proof of exploitation, and proof of concept (POC)

5. Suggestions for enhancing and fixing security

6. Possible vulnerability disclosure plan


Vulnerability Response

Sunseeker  values the vulnerability management of its products and services, supports responsible vulnerability disclosure and handling processes, and respects the research output of every security researcher. We will assign dedicated personnel to follow, analyze and handle each security issue that is reported to ensure that there is a timely resolution and response. We will send an email with the initial feedback within five working days. We will continue to follow up and provide updates on the vulnerability resolution progress until the fix is completed.


* Note: The actual time of response to the vulnerability may vary depending on its risk level and complexity.


Vulnerability awareness: Take the initiative to monitor and receive the potential security vulnerabilities and issues that are reported, and remain in contact with the vulnerability reporters.


Vulnerability verification: Verify whether potential security vulnerabilities and problems affect the security of our products, assess risks, and inform users about the rectification timeline and vulnerability levels.


Fixing vulnerabilities: Develop plans for mitigating the risks of and fixing vulnerabilities, verify the results of the vulnerability fix, and provide product upgrade packages or patches.


Vulnerability disclosure: Disclose vulnerability information when workarounds and patches are available (or when new releases are launched).


Problem improvement: After the vulnerability is disclosed, we will monitor the effectiveness of the remedy, collect customer feedback and suggestions, and update the patch/upgrade the package if necessary. Sunseeker  will also keep improving product development and vulnerability handling processes.


Throughout the vulnerability handling process, we will strictly control the scope of the vulnerability information and limit its dissemination to only the relevant personnel involved in the vulnerability remediation. We also request that the vulnerability reporter promise to keep the vulnerability information confidential until a complete resolution is provided to the users.


We will take the necessary and reasonable measures to protect the vulnerability data that we obtain based on legal compliance. Sunseeker  will not voluntarily share or disclose the above data to other parties unless expressly requested to by the affected customer or if required by law.


COPYRIGHT ©SHANGHAI SUNSEEKER ROBOTIC TECHNOLOGY CO.,LTD. ALL RIGHTS RESERVED. | 上海山科机器人有限公司