Vulnerability Disclosure Policy

Thank you for your choice of wan AIChef products. We attach great importance to the security of our products and are committed to providing users with a safe and reliable product experience. To ensure the security of our products, we have established a clear Vulnerability Disclosure Policy to encourage security researchers and users to report potential security issues responsibly, and to provide our customers with explanations of disclosed vulnerabilities and guidance on risk mitigation.

1. Scope of Application

This policy applies to all wan AIChef products and related software systems, including but not limited to:

  • Products and software
  • Services and infrastructure
  • Related firmware and software updates

2. Vulnerability Disclosure

We encourage security researchers and users to report security vulnerabilities through the following channels:

Security Vulnerability Reporting Email: security@wanaichef.com

Report Requirements:
  • Provide a clear description of the vulnerability.
  • Provide steps to reproduce the vulnerability.
  • Describe the potential impact of the vulnerability.
  • Provide relevant screenshots or video evidence (if available).
  • Do not publicly disclose the vulnerability details.

3. Our Commitments

We are committed to:

  • Acknowledge receipt of the report within three working days.
  • Promptly organize our team to verify and assess the vulnerability, followed by initiating remediation, and providing a remediation plan.
  • Release security updates to users through our official channel (https://www.global.wanaichef.com/pages/security) upon completion of the remediation.

4. Important Notes

  • We encourage responsible vulnerability disclosure and will not pursue or support any legal action related to your vulnerability research (except in cases of malicious behavior).
  • Please do not conduct any testing that may infringe upon user privacy, degrade user experience, disrupt system services, or cause data damage.
  • Please do not perform social engineering testing (such as phishing or vishing).
  • Please do not publicly disclose vulnerability details until a remediation has been released by us.
  • This policy does not apply to vulnerabilities that have already been publicly disclosed or to vulnerability information obtained through informal channels.

5. Contact Information

6. List of Disclosed Security Vulnerabilities