Carrello

Il tuo carrello è attualmente vuoto.

Vai a fare shopping

Vulnerability Disclosure Policy

Security Center - Responsible Disclosure

Overview

HILLSDALE TECHNOLOGY LLC ("Homture") is committed to ensuring the security of our products and services. We value the security research community's contributions and encourage responsible disclosure of security vulnerabilities.
This Vulnerability Disclosure Policy outlines how to report security vulnerabilities to us, our handling process, and expected response timelines.

Reporting Channels

If you discover a security vulnerability in our products or services, please report it to us through the following channels:

Contact Information

Vulnerability Handling Process

  1. Receipt Acknowledgment We will acknowledge receipt of your report within 2 business days.
  2. Initial Assessment Our security team will conduct an initial assessment of the reported vulnerability within 5 business days to determine its severity and impact.
  3. Detailed Investigation We will conduct a thorough investigation and develop a remediation plan.
  4. Fix Implementation Based on the vulnerability's severity, we will implement fixes and deploy updates as quickly as possible.
  5. Disclosure Coordination We will work with you to coordinate the timing of public disclosure to ensure users have adequate time to apply security updates.

Response Timeline

Stage Timeframe
Receipt Acknowledgment Within 2 business days
Initial Assessment Within 5 business days
Vulnerability Resolution 30-90 days (depending on severity and complexity)
Note: For critical vulnerabilities, we will expedite the handling process and may provide updates more frequently.

Scope

This policy applies to the following products and services:
  • ✓ Homture mobile application (iOS and Android)
  • ✓ Homture web services and APIs
  • ✓ Homture official website (www.homture.com)
  • ✓ Other products and services officially released by Homture

Responsible Disclosure Guidelines

To help us better handle your report, please include the following information:
  1. Detailed description of the vulnerability, including affected products/versions
  2. Steps to reproduce the vulnerability
  3. Potential impact assessment
  4. Proof of concept (if applicable)
  5. Your contact information for follow-up communication
  6. Any other relevant technical details
Our Commitment
We commit not to take legal action against security researchers who discover and report vulnerabilities in accordance with this policy. We appreciate your responsible disclosure and will acknowledge your contribution (with your permission) after the vulnerability is resolved.

Contact Information

For security-related inquiries, please contact:
Last Updated: March 2026