Quantum Docs

Vulnerability Reporting

Help us secure our systems by reporting potential security issues.

1. Scope

We invite researchers to report potential security vulnerabilities affecting Quantum Computing Inc applications and services. This includes issues in:

  • Website applications and APIs
  • Customer data protection mechanisms
  • Authentication and authorization systems
  • Publicly accessible infrastructure

Please do not test systems without first submitting a report.

2. Reporting Process

  1. Identify Vulnerability: Verify the issue is specific to our systems
  2. Prepare Details: Include full reproduction steps and affected endpoints
  3. Submit Report: Use our secure vulnerability reporting form below
  4. Confirm Response: We will acknowledge your report within 48 hours
  5. Resolution: Our security team will prioritize and fix the issue

3. Vulnerability Submission Form

Include reproduction steps, affected endpoints, and any relevant screenshots.

4. Responsible Disclosure

Researchers must follow responsible disclosure practices:

  • Not share findings publicly before resolution
  • Not extract or modify customer data
  • Not disrupt system operations during testing
  • Not monetize vulnerabilities directly

In exchange for responsible reporting, we commit to:

  • Timely acknowledgment and triage
  • Transparent communication during resolution
  • Public credit for the researcher
  • Security bounties for valid high-risk issues

5. Contact

For urgent security issues, contact our security team directly at:

security@quantumcomputingsinc.com
Confidential submissions only