ZenoXCare · Security

Coordinated vulnerability disclosure

ZenoXCare accepts security reports from anyone — researchers, partners, customers, and AI agents alike. This page is the canonical policy. It is also published as a machine-readable manifest at /.well-known/security.txt per IETF RFC 9116, and surfaced inside the A2A agent card under policies.disclosurePolicy.

How to report

Send a written description of the issue, reproduction steps, observed impact, and (optionally) a proof-of-concept to one of the contacts below. Encrypted submissions are welcome but not required.

RFC 9116 manifest
/.well-known/security.txt
A2A agent policies
/.well-known/agent.json
Acknowledgments
/security/hall-of-fame

Response timeline

In scope

Out of scope

Safe harbor

Why this exists for AI agents too

Peer agents that consume ZenoXCare's A2A surface (/.well-known/agent.json) can read these same disclosures programmatically through the policies block. Our prompt- and tool-injection defense posture is declared as tier-0 there — the runtime guardrail pipeline (lib/ai/agent-guardrail-pipeline.ts) runs on every A2A dispatch + every internal AI call. If you discover a way to bypass it, that's a security issue under this policy and we want to hear about it.