CUKO·LTD / FRACTIONAL CTO LON · GMT+0 REV 2026-04-26

Security disclosure policy

Cuko Ltd welcomes reports of security weaknesses in cuko.uk and the open-source projects published under the github.com/Cuko-ltd organisation. This page sets out scope, safe harbour, submission steps, and the response timeline you can expect.

The machine-readable companion is published at /.well-known/security.txt, conforming to RFC 9116.

What is covered

In scope

  • cuko.ukThe static marketing site you are reading, including all sub-paths and the published machine-readable artefacts (sitemap, robots, llms.txt, security.txt).
  • Cuko AIP and related repositoriesPublic repositories under github.com/Cuko-ltd, including the protocol specification, anchor contracts, anchor service, SDKs, and worked examples.

Out of scope

  • GitHub Pages infrastructureVulnerabilities in GitHub Pages itself, GitHub authentication, or Microsoft hosting infrastructure should be reported to GitHub's bug-bounty programme.
  • Best-practice scoring without impactReports based purely on automated-scanner output (e.g. missing security headers, CSP recommendations) without a demonstrated impact path are valued but not eligible for prioritised response.
  • Social engineering of staff or clientsPhishing, vishing, or any social-engineering attempt against Cuko Ltd personnel, contractors, or clients is out of scope and not authorised.
  • Denial-of-service testingDoS, DDoS, or volumetric load testing is out of scope and not authorised.
  • Physical securityOffice, premises, or device-level physical access is out of scope.

Good-faith research is welcome

Cuko Ltd will not pursue legal action against researchers who:

act in good faith and avoid privacy violations, destruction of data, and degradation of service; only test against assets explicitly listed in scope; report any vulnerability they discover promptly through the contact channel below; and give Cuko Ltd a reasonable opportunity to remediate before any public disclosure.

This policy is intended to be compatible with the safe-harbour provisions of the UK Computer Misuse Act 1990 (as proposed for amendment) and Article 6 of the EU Cyber Resilience Act. It does not, however, override third-party rights — researchers remain responsible for their interactions with services not owned by Cuko Ltd.

Submitting a vulnerability

Send a single email to [email protected] with the subject line beginning Security vulnerability report. Include:

Asset
Which in-scope asset is affected (URL, repository name, commit hash where relevant).
Description
What the vulnerability is, in plain language.
Reproduction
Step-by-step reproduction with minimal proof-of-concept.
Impact
What an attacker could achieve in practice. Theoretical impact is fine; demonstrated impact is better.
Mitigation
Optional — your suggestion for the fix.
Credit
Whether you want public credit on resolution. Default is no credit unless you opt in.

Encrypted communication is not currently supported. If you require encrypted submission, contact us first at the address above and we will arrange an alternative channel for that report.

Service-level commitments

Acknowledgement
Within two working days of receipt
Initial assessment
Within five working days, including a preliminary severity rating
Remediation
Critical and high severity within 30 days; medium within 60 days; low within 90 days, where the underlying asset permits
Update cadence
Status update every fortnight while the report is open
Disclosure
Coordinated public disclosure no earlier than 90 days after initial report, or earlier by mutual agreement

Researchers credited

None to date. Researchers who give Cuko Ltd a reasonable opportunity to fix and who opt in to public credit will be listed here on resolution.

About this policy

Last updated
2026-04-26
Review cadence
Annually and after any material incident
Machine-readable companion
/.well-known/security.txt (RFC 9116)
Book a discovery call