BUG BOUNTY PROGRAM
MiCA-Aligned | Delaware Corporate Governance Framework
Effective Date: 17 February 2026
Last Updated: 17 February 2026
Responsible Disclosure & Bug Bounty Program
AI Vault Systems Inc. (“AI Vault,” “Company,” “we,” “us,” or “our”) is committed to maintaining strong cybersecurity controls, operational resilience, and integrity across its digital infrastructure and the Virdato (VIRD) utility token ecosystem.
This Responsible Disclosure Program establishes an authorized channel for coordinated vulnerability disclosure and defines eligibility criteria for discretionary recognition and rewards.
This program is structured to align with:
- EU Digital Operational Resilience principles
- Markets in Crypto-Assets (MiCA) operational risk expectations
- GDPR data protection requirements
- U.S. cybersecurity best practices
- Delaware corporate governance standards
1. Purpose
The purpose of this program is to:
- Encourage responsible security research
- Identify vulnerabilities before malicious exploitation
- Strengthen platform integrity and user trust
- Support operational resilience in a regulated digital asset environment
2. Scope
A. Infrastructure
- Production web applications
- Backend services and microservices
- Authentication & identity systems
- Data processing pipelines
- Cloud hosting environments
- CI/CD and deployment logic
B. APIs
- Public and private API endpoints
- Access control logic
- Rate limiting controls
- Reward calculation engines
- Signature validation systems
C. Blockchain & Token Systems
- Virdato (VIRD) smart contracts
- Reward distribution logic
- Claim thresholds and vesting controls
- Gas efficiency logic (where exploitable)
- On-chain/off-chain synchronization mechanisms
D. Integrations
- Third-party wallet connectors
- Payment processors (where under Company control)
- Oracle integrations
3. Out of Scope
- Denial-of-service attacks without demonstrated security bypass
- Social engineering attempts
- Physical security testing
- Economic speculation or token price manipulation
- Third-party services not under Company control
- Automated scans without validated exploitability
- Theoretical vulnerabilities requiring unrealistic threat models
4. Responsible Disclosure Requirements
To qualify under this program, researchers must:
- Submit findings privately to: security@aivaultsystems.com
- Provide clear reproduction steps
- Include proof-of-concept evidence
- Describe technical impact
- Estimate CVSS v3.1 score where possible
- Identify affected contracts, endpoints, or components
Researchers must NOT:
- Exfiltrate user data
- Exploit vulnerabilities for financial gain
- Mint tokens or manipulate reward pools
- Disrupt services beyond minimal proof-of-concept
- Disclose findings publicly prior to coordinated remediation
5. Safe Harbor
If you act in good faith and strictly within the scope of this policy:
- AI Vault will not pursue civil litigation
- The Company will not refer compliant research to law enforcement
- Security testing conducted under this program is considered authorized
Safe harbor applies only to actions fully compliant with this policy.
6. Severity Classification Framework
Vulnerabilities are assessed using a hybrid evaluation model incorporating:
- CVSS v3.1 scoring
- Smart contract risk exposure
- Token economic impact
- Data exposure magnitude
- Privilege escalation potential
- Regulatory and operational exposure
Severity Levels
Critical (CVSS 9.0–10.0)- Unauthorized token minting
- Reward pool drain
- Admin key compromise
- Authentication bypass with systemic impact
- Signature replay
- Privilege escalation
- Major reward logic bypass
- Rate-limit bypass
- Limited data exposure
- Non-critical logic flaws
- Configuration issues
- Cosmetic API disclosures
7. Bug Bounty Reward Structure (Discretionary)
All rewards are discretionary and based on verified impact.
| Severity | Indicative Range (USD) |
|---|---|
| Critical | $5,000 – $25,000+ |
| High | $1,000 – $5,000 |
| Medium | $250 – $1,000 |
| Low | Public acknowledgment |
Rewards may be issued in:
- USD (wire transfer)
- EUR (SEPA transfer)
- VIRD utility tokens (Company discretion)
Participation does not create employment, partnership, fiduciary, or contractual rights.
8. Incident Response Timeline
- Acknowledgment: within 72 hours
- Initial triage: 3–7 business days
- Critical remediation: 7–21 days
- High remediation: 14–30 days
- Medium/Low remediation: 30–60 days
Timelines may accelerate where systemic or token integrity risk exists.
9. Confidentiality & Coordinated Disclosure
Reports are treated confidentially. Public disclosure may occur only after remediation and coordinated agreement.
10. Regulatory Positioning
This program supports proactive ICT risk mitigation consistent with EU digital operational resilience principles. Nothing herein constitutes regulatory admission, crypto-asset service classification, or financial instrument status.
11. Delaware Corporate Notice
AI Vault Systems Inc. is incorporated in Delaware, United States. This program does not create contractual, employment, or partnership relationships. All disputes are governed by Delaware law unless mandatory EU protections apply.
12. Secure Reporting (PGP)
Researchers are encouraged to encrypt sensitive submissions.
Email: security@aivaultsystems.com
Key Type: RSA 4096
Fingerprint: [INSERT FINGERPRINT]
-----BEGIN PGP PUBLIC KEY BLOCK----- [INSERT PUBLIC KEY HERE] -----END PGP PUBLIC KEY BLOCK-----