Implements the vulnerability-management requirements of the Operations Security Policy.

Sources of findings

  • Vulnerability scans of public-facing production systems — at least quarterly.
  • Penetration tests — at least annually, plus after major changes.
  • Vendor advisories for software in use.
  • Bug bounty — private bug bounty, by invitation only. Researchers seeking an invitation, or wishing to disclose a vulnerability outside the program, should email security@neuroscale.ai. Neuroscale will not pursue legal action against good-faith researchers who follow the disclosure expectations published on the Trust Center and the Report a Security Issue page.
  • Internal review and red-team exercises.
  • Reported findings — internal staff and external researchers submit findings via the Vulnerability intake form.

Tooling

ConcernTool
External vulnerability scanningDetectify
Dependency / SCADependabot, Snyk, and GitHub Advanced Security
Container scanningTrivy
Cloud posture managementVanta
Penetration testing(todo: vendor)

Triage

Findings are evaluated by Security and Engineering. Neuroscale’s assessed severity may differ from a tool’s auto-rating based on internal architecture and exploitability.

Remediation SLAs

SeverityTime to remediate
Critical7 days
High30 days
Medium60 days
Low90 days
InformationalAs needed
Tickets that cannot be remediated within the standard timeline must include a risk-treatment plan and planned remediation timeline approved by the CISO.

Tracking

Active findings live in the Linear “Vulnerabilities” board. Status is reviewed weekly by Security and reported quarterly to leadership.

Version history

VersionDateDescriptionAuthorApproved by
1.0May 8, 2026Initial versionCameron WolfeIshan Jadhwani