Vulnerability Disclosure Policy 

Procedure for Reporting Vulnerabilities in Our Products 

If you discover a vulnerability in a product developed by our company, please report it to our dedicated vulnerability disclosure email address: . When submitting a report, we kindly ask that you download our PGP public key from this link and encrypt your email accordingly. Additionally, to facilitate a prompt and appropriate response, please provide the following details: 

  1. Reporter Information 
  • Name (Handle or Anonymous reporting is acceptable) 
  • Consent for name disclosure (Yes/No) 
  1. Vulnerability Details 
  • Name and version of the affected product or service 
  • Steps to reproduce the issue (Please describe in as much detail as possible. If available, please include Proof of Concept or screenshots) 
  • Potential impact of the vulnerability (e.g., buffer overflow.) 

Reporting Guidelines 

  • Please report only vulnerabilities that have been discovered without engaging in illegal activities. Unauthorized access, data extraction, DDoS attacks, are prohibited. 
  • Do not disclose the vulnerability information to third parties until the company officially publishes it. 

Scope of Coverage 

The following company-owned services and systems are covered by this policy: 

  • KUSANAGI 
  • WEXAL® Page Speed Technology® 
  • kusanagi.tokyo 
  • wexal.jp 
  • prime-strategy.co.jp 

However, the following are not covered by this policy: 

  • Third-party products or services 
  • Physical security vulnerabilities 
  • Social engineering attacks 

Post-Report Handling Process 

  1. Upon receiving a report, we will acknowledge receipt within five business days (Japan Standard Time). If the report is not accepted, we will notify the reporter with the reason. 
  2. We will analyze the reported issue and may request additional details from the reporter if necessary. 
  3. We will develop a patch or explore temporary mitigation measures as appropriate. 
  4. Once the process is complete, we will provide a report on the outcome to the reporter. 
  5. At an appropriate time, we will publicly disclose the vulnerability information. If consent is given, we will acknowledge the reporter in our disclosure. 

Treatment of Reporters 

  • We will handle reports in good faith in accordance with this policy. 
  • We will respect the privacy of the reporter and use the information only for security improvement purposes. 
  • We will not respond to any reports involving illegal activities, malicious intent including unauthorized access, or threats. 

Contact Information 

For any inquiries, please contact us by using this contact form

If you have any questions or concerns,
please feel free to contact us using our contact form.