Skip to Content
VDP / Governance

Vulnerability
Disclosure
Policy

Our proactive steps to ensure the security of the digital logistics ecosystem through collaboration with the security community.

Scroll to explore
Step by Step

Reporting Procedure

01. Identification

Determine the type of vulnerability (XSS, SQLi, Auth, etc.) and prepare proof of discovery (PoC).

02. Documentation

Create a detailed report including URL, parameters, and instructions to reproduce the gap.

03. Submission

Submit your report confidentially to security@jagalautanbersama.co.id.

In-Scope

*.jagalautanbersama.id

*Only the official domains above are included in this testing scope.

Safe Harbor

We guarantee legal protection for researchers who act honestly, avoid system damage, and provide us with enough time for handling.

Updated 14 April 2026

© 2026 PT. Jaga Lautan Bersama | Authorized Security Policy v2.1