
QinetiQ Response
External Program
Submit bugs directly to this organization


External Program
Submit bugs directly to this organization
We encourage responsible vulnerability disclosure as a means of strengthening the digital environment which we all live in today. If you believe you have found a vulnerability in any of QinetiQ's systems, we invite you to report it to us through the secure channels detailed below.
The security of our systems, assets, and infrastructure is fundamental to everything QinetiQ does. We understand the importance of creating resilient solutions that can withstand ever-evolving threats to our systems, services and data. To that end, we value the contributions of the security research community in identifying vulnerabilities and helping us safeguard our operations.
We encourage responsible vulnerability disclosure as a means of strengthening the digital environment which we all live in today. If you believe you have found a vulnerability in any of QinetiQ's systems, we invite you to report it to us through the secure channels detailed below.
In the submission, please ensure you include details of:
We aim to provide first response to your submission within one working day and triage of the report within five working days. We will work with you throughout the process to ensure that the issue is resolved in a timely and transparent manner.
QinetiQ appreciates the responsible disclosure of security vulnerabilities. To facilitate a productive and legal collaboration, we request that researchers:
Maintain Integrity: Avoid using any tools or techniques that could compromise or degrade QinetiQ systems (e.g. denial-of-service attacks, brute-force attempts, or intrusive scanning).
Respect Rate Limits: Traffic must be restricted to a maximum of 10 requests per second per endpoint. Automated tools or scanners should be configured accordingly. Where possible, use a custom User-Agent string such as: qinetiqvdp, and consider adding a header such as: X-HackerOne-Researcher:
Stay Within the Law: Ensure that your research complies with all relevant legal frameworks, both locally and internationally. This includes complying with applicable privacy and data protection laws.
Limit Access: Only access the minimum data required to demonstrate a vulnerability.
Data Security: Where technically feasible, refrain from accessing data which is not your own. In all circumstances, do not modify or share data that is not your own. In particular, you must not share, redistribute or fail to properly secure data retrieved from QinetiQ's systems or services.
Confidentiality: Keep details of the vulnerability confidential to QinetiQ until we have notified you that it has been resolved. Even when the vulnerability has been resolved, any disclosure that you wish to make regarding the vulnerability requires our express consent and must not be linked in any way to QinetiQ. You must securely delete all data retrieved during the research as soon as it is no longer required or within one calendar month of the date when we notify you that the vulnerability has been resolved (whichever occurs first). QinetiQ requires a minimum of 120 days to validate and address the issue.
As part of responsible security research, we recommend reviewing and adhering to RFC 9511, which outlines guidelines for conducting coordinated vulnerability disclosure activities.
Upon submitting a vulnerability report, you can expect:
QinetiQ recognises and appreciates the efforts of security researchers acting in good faith under this program. Research that complies with these guidelines will be considered as authorised by QinetiQ (a "Safe Harbour").
Public disclosure of vulnerabilities before they have been addressed, without our explicit consent, will be considered non-compliant with the terms of this policy and may result in the loss of Safe Harbour protection and QinetiQ taking legal action against you.
Please note that this policy does not extend to third party systems or services that QinetiQ does not control, and those entities may choose to take legal action independently.
When reporting potential vulnerabilities, please consider (1) realistic attack scenarios, and (2) the security impact of the behaviour. The following issues will be closed as invalid except in rare circumstances demonstrating clear security impact:
Refer to HackerOne's Core Ineligible Findings for details.
QinetiQ's vulnerability disclosure policy is aligned with established industry best practices. However, it does not grant permission to act outside the bounds of applicable law. Researchers are expected to abide by all applicable legal requirements, and this policy does not indemnify individuals against any legal actions taken by other organisations as a result of unauthorised activities.