1. Scope
We invite researchers to report potential security vulnerabilities affecting Quantum Computing Inc applications and services. This includes issues in:
- Website applications and APIs
- Customer data protection mechanisms
- Authentication and authorization systems
- Publicly accessible infrastructure
Please do not test systems without first submitting a report.
2. Reporting Process
- Identify Vulnerability: Verify the issue is specific to our systems
- Prepare Details: Include full reproduction steps and affected endpoints
- Submit Report: Use our secure vulnerability reporting form below
- Confirm Response: We will acknowledge your report within 48 hours
- Resolution: Our security team will prioritize and fix the issue
3. Vulnerability Submission Form
4. Responsible Disclosure
Researchers must follow responsible disclosure practices:
- Not share findings publicly before resolution
- Not extract or modify customer data
- Not disrupt system operations during testing
- Not monetize vulnerabilities directly
In exchange for responsible reporting, we commit to:
- Timely acknowledgment and triage
- Transparent communication during resolution
- Public credit for the researcher
- Security bounties for valid high-risk issues
5. Contact
For urgent security issues, contact our security team directly at:
security@quantumcomputingsinc.com
Confidential submissions only