{"id":50859,"date":"2025-02-06T18:13:08","date_gmt":"2025-02-06T09:13:08","guid":{"rendered":"https:\/\/www.prime-strategy.co.jp\/?page_id=50859"},"modified":"2025-02-06T18:24:21","modified_gmt":"2025-02-06T09:24:21","slug":"vulnerability-disclosure-policy","status":"publish","type":"page","link":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/","title":{"rendered":"Vulnerability Disclosure Policy\u00a0"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Procedure for Reporting Vulnerabilities in Our Products<\/strong>&nbsp;<\/h2>\n\n\n\n<p>If you discover a vulnerability in a product developed by our company, please report it to our dedicated vulnerability disclosure email address: <img loading=\"lazy\" decoding=\"async\" width=\"252\" height=\"16\" class=\"wp-image-50864\" style=\"width: 252px;\" src=\"https:\/\/www.prime-strategy.co.jp\/wp-content\/uploads\/2025\/02\/image1.jpg\" alt=\"\">. When submitting a report, we kindly ask that you <a href=\"https:\/\/jpc-word-edit.officeapps.live.com\/we\/(https:\/\/prime-strategy.co.jp\/.well-known\/openpgpkey\/hu\/j6xq8rwe99axs4atcbxqr9whrig3timf\" target=\"_blank\" rel=\"noreferrer noopener\">download our PGP public key from this link<\/a> and encrypt your email accordingly. Additionally, to facilitate a prompt and appropriate response, please provide the following details:\u00a0<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Reporter Information&nbsp;<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Name (Handle or Anonymous reporting is acceptable)&nbsp;<\/li>\n\n\n\n<li>Consent for name disclosure (Yes\/No)&nbsp;<\/li>\n<\/ul>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>Vulnerability Details&nbsp;<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Name and version of the affected product or service&nbsp;<\/li>\n\n\n\n<li>Steps to reproduce the issue (Please describe in as much detail as possible. If available, please include Proof of Concept or screenshots)&nbsp;<\/li>\n\n\n\n<li>Potential impact of the vulnerability (e.g., buffer overflow.)&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Reporting Guidelines<\/strong>&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Please report only vulnerabilities that have been discovered without engaging in illegal activities. Unauthorized access, data extraction, DDoS attacks, are prohibited.&nbsp;<\/li>\n\n\n\n<li>Do not disclose the vulnerability information to third parties until the company officially publishes it.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Scope of Coverage<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The following company-owned services and systems are covered by this policy:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>KUSANAGI&nbsp;<\/li>\n\n\n\n<li>WEXAL\u00ae Page Speed Technology\u00ae&nbsp;<\/li>\n\n\n\n<li>kusanagi.tokyo&nbsp;<\/li>\n\n\n\n<li>wexal.jp&nbsp;<\/li>\n\n\n\n<li>prime-strategy.co.jp&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>However, the following are not covered by this policy:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Third-party products or services&nbsp;<\/li>\n\n\n\n<li>Physical security vulnerabilities&nbsp;<\/li>\n\n\n\n<li>Social engineering attacks&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Post-Report Handling Process<\/strong>&nbsp;<\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Upon receiving a report, we will acknowledge receipt within five business days (Japan Standard Time). If the report is not accepted, we will notify the reporter with the reason.&nbsp;<\/li>\n\n\n\n<li>We will analyze the reported issue and may request additional details from the reporter if necessary.&nbsp;<\/li>\n\n\n\n<li>We will develop a patch or explore temporary mitigation measures as appropriate.&nbsp;<\/li>\n\n\n\n<li>Once the process is complete, we will provide a report on the outcome to the reporter.&nbsp;<\/li>\n\n\n\n<li>At an appropriate time, we will publicly disclose the vulnerability information. If consent is given, we will acknowledge the reporter in our disclosure.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Treatment of Reporters<\/strong>&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We will handle reports in good faith in accordance with this policy.&nbsp;<\/li>\n\n\n\n<li>We will respect the privacy of the reporter and use the information only for security improvement purposes.&nbsp;<\/li>\n\n\n\n<li>We will not respond to any reports involving illegal activities, malicious intent including unauthorized access, or threats.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contact Information<\/strong>&nbsp;<\/h2>\n\n\n\n<p>For any inquiries, please contact us by using <a href=\"https:\/\/www.prime-strategy.co.jp\/en\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">this contact form<\/a>.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Procedure for Reporting Vulnerabilities in Our Products&nbsp; If you discover a vulnerability in a product developed by our company, please report it to our dedicated vulnerability disclosure email address: . When submitting a report, we kindly ask that you download our PGP public key from this link and encrypt your email accordingly. Additionally, to facilitate a prompt and appropriate response, please provide the following details:\u00a0 Reporting Guidelines&nbsp; Scope of Coverage&nbsp; The following company-owned services and systems are covered by this policy:&nbsp; However, the following are not covered by this policy:&nbsp; Post-Report Handling Process&nbsp; Treatment of Reporters&nbsp; Contact Information&nbsp; For any inquiries, please contact us by using this contact form.&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":50903,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"keyword":[],"class_list":{"0":"post-50859","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"no-featured-image-padding"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability Disclosure Policy\u00a0 - Prime Strategy Co., Ltd.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Disclosure Policy\u00a0 - Prime Strategy Co., Ltd.\" \/>\n<meta property=\"og:description\" content=\"Procedure for Reporting Vulnerabilities in Our Products&nbsp; If you discover a vulnerability in a product developed by our company, please report it to our dedicated vulnerability disclosure email address: . When submitting a report, we kindly ask that you download our PGP public key from this link and encrypt your email accordingly. Additionally, to facilitate a prompt and appropriate response, please provide the following details:\u00a0 Reporting Guidelines&nbsp; Scope of Coverage&nbsp; The following company-owned services and systems are covered by this policy:&nbsp; However, the following are not covered by this policy:&nbsp; Post-Report Handling Process&nbsp; Treatment of Reporters&nbsp; Contact Information&nbsp; For any inquiries, please contact us by using this contact form.&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Prime Strategy Co., Ltd.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/primestrategy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-06T09:24:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.prime-strategy.co.jp\/wp-content\/uploads\/2025\/02\/vdp.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@primestrategyjp\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/vulnerability-disclosure-policy\\\/\",\"url\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/vulnerability-disclosure-policy\\\/\",\"name\":\"Vulnerability Disclosure Policy\u00a0 - Prime Strategy Co., Ltd.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/vulnerability-disclosure-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/vulnerability-disclosure-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/vdp.png\",\"datePublished\":\"2025-02-06T09:13:08+00:00\",\"dateModified\":\"2025-02-06T09:24:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/vulnerability-disclosure-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/vulnerability-disclosure-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/vulnerability-disclosure-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/vdp.png\",\"contentUrl\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/vdp.png\",\"width\":1200,\"height\":600,\"caption\":\"\u8106\u5f31\u6027\u60c5\u5831\u516c\u958b\u30dd\u30ea\u30b7\u30fc\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/vulnerability-disclosure-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Disclosure Policy\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/\",\"name\":\"Prime Strategy Co., Ltd.\",\"description\":\"Web Acceleration Solution KUSANAGI Stack and Hyper Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/#organization\",\"name\":\"Prime Strategy Co., Ltd.\",\"url\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/GMO_PrimeStrategy_RGB_logo_01.png\",\"contentUrl\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/GMO_PrimeStrategy_RGB_logo_01.png\",\"width\":1905,\"height\":259,\"caption\":\"Prime Strategy Co., Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prime-strategy.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/primestrategy\",\"https:\\\/\\\/x.com\\\/primestrategyjp\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Disclosure Policy\u00a0 - Prime Strategy Co., Ltd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Disclosure Policy\u00a0 - Prime Strategy Co., Ltd.","og_description":"Procedure for Reporting Vulnerabilities in Our Products&nbsp; If you discover a vulnerability in a product developed by our company, please report it to our dedicated vulnerability disclosure email address: . When submitting a report, we kindly ask that you download our PGP public key from this link and encrypt your email accordingly. Additionally, to facilitate a prompt and appropriate response, please provide the following details:\u00a0 Reporting Guidelines&nbsp; Scope of Coverage&nbsp; The following company-owned services and systems are covered by this policy:&nbsp; However, the following are not covered by this policy:&nbsp; Post-Report Handling Process&nbsp; Treatment of Reporters&nbsp; Contact Information&nbsp; For any inquiries, please contact us by using this contact form.&nbsp;","og_url":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/","og_site_name":"Prime Strategy Co., Ltd.","article_publisher":"https:\/\/www.facebook.com\/primestrategy","article_modified_time":"2025-02-06T09:24:21+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.prime-strategy.co.jp\/wp-content\/uploads\/2025\/02\/vdp.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@primestrategyjp","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/","url":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/","name":"Vulnerability Disclosure Policy\u00a0 - Prime Strategy Co., Ltd.","isPartOf":{"@id":"https:\/\/www.prime-strategy.co.jp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/#primaryimage"},"image":{"@id":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.prime-strategy.co.jp\/wp-content\/uploads\/2025\/02\/vdp.png","datePublished":"2025-02-06T09:13:08+00:00","dateModified":"2025-02-06T09:24:21+00:00","breadcrumb":{"@id":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/#primaryimage","url":"https:\/\/www.prime-strategy.co.jp\/wp-content\/uploads\/2025\/02\/vdp.png","contentUrl":"https:\/\/www.prime-strategy.co.jp\/wp-content\/uploads\/2025\/02\/vdp.png","width":1200,"height":600,"caption":"\u8106\u5f31\u6027\u60c5\u5831\u516c\u958b\u30dd\u30ea\u30b7\u30fc"},{"@type":"BreadcrumbList","@id":"https:\/\/www.prime-strategy.co.jp\/en\/vulnerability-disclosure-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.prime-strategy.co.jp\/en\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Disclosure Policy\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.prime-strategy.co.jp\/en\/#website","url":"https:\/\/www.prime-strategy.co.jp\/en\/","name":"Prime Strategy Co., Ltd.","description":"Web Acceleration Solution KUSANAGI Stack and Hyper Automation","publisher":{"@id":"https:\/\/www.prime-strategy.co.jp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.prime-strategy.co.jp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.prime-strategy.co.jp\/en\/#organization","name":"Prime Strategy Co., Ltd.","url":"https:\/\/www.prime-strategy.co.jp\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.prime-strategy.co.jp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.prime-strategy.co.jp\/wp-content\/uploads\/2026\/02\/GMO_PrimeStrategy_RGB_logo_01.png","contentUrl":"https:\/\/www.prime-strategy.co.jp\/wp-content\/uploads\/2026\/02\/GMO_PrimeStrategy_RGB_logo_01.png","width":1905,"height":259,"caption":"Prime Strategy Co., Ltd."},"image":{"@id":"https:\/\/www.prime-strategy.co.jp\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/primestrategy","https:\/\/x.com\/primestrategyjp"]}]}},"_links":{"self":[{"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/pages\/50859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/comments?post=50859"}],"version-history":[{"count":3,"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/pages\/50859\/revisions"}],"predecessor-version":[{"id":50890,"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/pages\/50859\/revisions\/50890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/media\/50903"}],"wp:attachment":[{"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/media?parent=50859"}],"wp:term":[{"taxonomy":"keyword","embeddable":true,"href":"https:\/\/www.prime-strategy.co.jp\/en\/wp-json\/wp\/v2\/keyword?post=50859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}