<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Securities on Central Florida ADU Authority</title><link>https://centralfloridaadu.com/security/</link><description>Recent content in Securities on Central Florida ADU Authority</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 30 Apr 2026 15:30:15 -0400</lastBuildDate><atom:link href="https://centralfloridaadu.com/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Security Acknowledgments</title><link>https://centralfloridaadu.com/security/acknowledgments/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><guid>https://centralfloridaadu.com/security/acknowledgments/</guid><description>&lt;p>Researchers who have responsibly disclosed security issues affecting &lt;code>centralfloridaadu.com&lt;/code> are recognized below.&lt;/p>
&lt;h2 id="2026">2026&lt;/h2>
&lt;p>&lt;em>No acknowledgments yet.&lt;/em>&lt;/p>
&lt;h2 id="how-to-be-listed">How to be listed&lt;/h2>
&lt;p>Report a vulnerability under our &lt;a href="https://centralfloridaadu.com/security/policy/">disclosure policy&lt;/a>. With your consent, we will list your name or handle, the date of disclosure, and a brief description of the issue category. Specifics are withheld until any active risk is mitigated.&lt;/p>
&lt;p>We will not list anyone without their explicit permission.&lt;/p></description></item><item><title>Vulnerability Disclosure Policy</title><link>https://centralfloridaadu.com/security/policy/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><guid>https://centralfloridaadu.com/security/policy/</guid><description>&lt;p>This policy covers &lt;code>centralfloridaadu.com&lt;/code> and its subdomains. The operator welcomes reports from security researchers and treats all good-faith reports seriously.&lt;/p>
&lt;h2 id="scope">Scope&lt;/h2>
&lt;p>In scope: &lt;code>centralfloridaadu.com&lt;/code> and any subdomain operated by this site, except where explicitly excluded.&lt;/p>
&lt;h2 id="out-of-scope">Out of scope&lt;/h2>
&lt;ul>
&lt;li>Denial-of-service attacks of any kind, including resource-exhaustion testing&lt;/li>
&lt;li>Social engineering of operators, contractors, or third parties&lt;/li>
&lt;li>Physical attacks against infrastructure&lt;/li>
&lt;li>Reports from automated scanners without manual validation and reproducible impact&lt;/li>
&lt;li>Third-party services we depend on but do not control (Cloudflare, GitHub, Porkbun, Proton). Report those upstream.&lt;/li>
&lt;li>Vulnerabilities in unmodified upstream dependencies — report upstream and notify us if relevant&lt;/li>
&lt;li>Issues requiring a privileged position on the local network or the victim&amp;rsquo;s device&lt;/li>
&lt;li>Missing security headers without demonstrated impact&lt;/li>
&lt;li>Reports based solely on tool output without exploitation evidence&lt;/li>
&lt;/ul>
&lt;h2 id="how-to-report">How to report&lt;/h2>
&lt;p>Email: &lt;code>security@centralfloridaadu.com&lt;/code>&lt;/p></description></item></channel></rss>