JOHLEM

security tools & cheatsheets

Version 1.0 | Last updated: February 2026

Introduction

johlem.net takes security seriously. We welcome responsible disclosure of security vulnerabilities that may affect our website, tools, or infrastructure.

Reporting a Vulnerability

security@johlem.net

Encrypt sensitive reports using our PGP key (available on request).

What to Include

Scope

In Scope

Out of Scope

Qualifying Vulnerabilities

Rules of Engagement

Our Commitment

Response Timeline

Initial acknowledgment Within 48 business hours
Severity assessment Within 5 business days
Status updates Every 2 weeks minimum
Resolution target 30-90 days depending on severity

What We Will Do

Safe Harbor

Security research conducted in accordance with this policy is considered authorized. We will not pursue legal action against researchers who:

Recognition

We believe in recognizing security researchers who help us improve. With your permission, we will:

Note: We do not currently offer monetary rewards (bug bounty). This may change in the future.

Contact

Security reports: security@johlem.net
PGP key: Available on request
security.txt: /.well-known/security.txt

Security Acknowledgments | Quick Reference