AI Vault Systems Inc.
(Operating in the United States and European Union via AI Vault Iberia S.L)
1. Purpose
AI Vault Systems Inc. (“AI Vault”, “Company”, “we”, “our”) maintains a coordinated vulnerability disclosure program to ensure the security, integrity, and resilience of:
- Our AI data infrastructure
- Cloud systems and APIs
- Web and mobile applications
- Smart contracts and blockchain integrations
- The Virdato (VIRD) utility token ecosystem
- Token distribution and reward mechanisms
We support responsible security research and encourage coordinated disclosure consistent with applicable U.S. law and the European Union Markets in Crypto-Assets Regulation (MiCA).
2. Regulatory Context (EU MiCA & U.S.)
AI Vault Systems Inc. is incorporated in Delaware (United States) and may operate or offer services within the European Union.
Where applicable, Virdato (VIRD) is issued as a utility token under Regulation (EU) 2023/1114 (MiCA).
In alignment with MiCA requirements:
- Material operational or security incidents affecting the crypto-asset ecosystem may require regulatory notification.
- Significant cybersecurity events may require disclosure to competent EU authorities.
- Security weaknesses affecting token holders may require transparent communication.
Nothing in this policy limits mandatory regulatory reporting obligations under:
- MiCA
- GDPR
- EU cybersecurity frameworks
- U.S. federal or state law
3. Scope
This policy applies to vulnerabilities affecting:
A. AI Vault Data Infrastructure
- AI processing systems
- Creator reward systems
- Data ingestion pipelines
- Backend services and APIs
- Authentication systems
- Databases
- Cloud infrastructure
- Analytics engines
B. Virdato (VIRD) Utility Token Ecosystem
- Smart contracts (all supported networks)
- Token claim logic
- Reward threshold algorithms
- Off-chain validation services
- Token dashboards
- Wallet integrations
- Token distribution systems
4. Incident Classification Tiers
Security incidents are internally classified as follows:
🔴 Critical
- Smart contract exploit enabling token drain
- Unauthorized minting or inflation
- Compromise of private keys
- Mass exposure of personal data
- Systemic infrastructure breach
- Exploits affecting token economics
Response target: Immediate containment and emergency remediation.
🟠 High
- Privilege escalation vulnerabilities
- Bypass of authentication controls
- Exposure of sensitive operational data
- Significant reward manipulation risk
- Major API exploitation
Response target: Accelerated remediation and potential regulatory review.
🟡 Medium
- Information disclosure with limited impact
- Non-critical smart contract logic issues
- Rate limit bypass
- Minor reward miscalculation
Response target: Scheduled remediation.
🟢 Low
- Cosmetic issues
- Non-exploitable bugs
- Minor configuration weaknesses
Response target: Maintenance cycle resolution.
5. Reporting a Vulnerability
If you identify a vulnerability, you agree to:
- Notify us promptly at:
security@aivaultsystems.com - Provide:
- Detailed description
- Steps to reproduce
- Affected URLs or contract addresses
- Transaction hashes (if applicable)
- Proof-of-concept evidence
- Refrain from:
- Accessing user data
- Draining or claiming tokens
- Modifying system data
- Conducting denial-of-service testing
- Exploiting reward systems
- Manipulating liquidity pools
- Allow reasonable time for remediation before public disclosure.
6. Smart Contract & Token-Specific Rules
For Virdato-related vulnerabilities:
- Do not execute token extraction or liquidity drains
- Do not manipulate reward thresholds
- Do not interfere with token supply
- Do not attempt economic arbitrage
If a vulnerability impacts token holders, coordinated disclosure is required before public communication.
Unauthorized token manipulation may constitute fraud or market abuse under EU and U.S. law.
7. Safe Harbor
AI Vault will not pursue legal action against researchers who:
- Act in good faith
- Avoid privacy violations
- Avoid financial exploitation
- Comply with this policy
Safe harbor does not apply to:
- Token extraction
- Market manipulation
- Data harvesting
- Service disruption
- Intentional financial gain
8. Investigation & Regulatory Escalation
Upon receipt of a valid report, we will:
- Acknowledge receipt within a reasonable timeframe
- Investigate and validate findings
- Classify severity
- Remediate confirmed vulnerabilities
- Escalate to legal and compliance review if required
- Notify regulators if required under MiCA or applicable law
Where MiCA requires notification of a significant incident affecting crypto-asset holders, AI Vault reserves the right to notify competent authorities without delay.
9. Public Disclosure
Researchers must not publicly disclose vulnerabilities until:
- Remediation is confirmed, OR
- A mutually agreed disclosure timeline has passed
Premature disclosure that causes financial harm, token disruption, or regulatory exposure may void safe harbor protections.
10. No Financial Reward Guarantee
AI Vault may recognize valid security disclosures at its discretion.
This policy does not:
- Establish a bounty program
- Create contractual obligations
- Guarantee financial compensation
11. Legal Notice
This policy does not authorize:
- Unauthorized system access
- Token manipulation
- Economic exploitation
- Circumvention of technical controls
- Violation of EU or U.S. cybersecurity laws
All testing must remain within lawful boundaries.
12. Contact Information
Security Reports:
security@aivaultsystems.com
Corporate Entity:
AI Vault Systems Inc.
Delaware, United States
EU Operational Presence:
AI Vault Iberia S.L in Barcelona, Spain