Vulnerability Disclosure Program


GENERAL ORDER OF THE DIVINE SOL INC NFP is committed to ensuring the security of the American public by protecting their information from unwarranted disclosure. As such, GENERAL ORDER OF THE DIVINE SOL INC NFP has created a Vulnerability Disclosure Program and Policy to give security researchers clear guidelines for conducting vulnerability discovery activities on DOE systems and websites and to convey GENERAL ORDER OF THE DIVINE SOL INC NFP’s preferences in how to submit discovered vulnerabilities to the Department.

The Department’s program, and the rules of engagement described herein, describe what systems and types of research are covered under this program, how to submit vulnerability reports, and asks that reporters refrain from publicly disclosing submitted vulnerabilities.

Vulnerability disclosure is the “act of initially providing vulnerability information to a party that was not believed to be previously aware.” The individual or organization that performs this act is called the Reporter. This program allows Reporters to alert GENERAL ORDER OF THE DIVINE SOL INC NFP to security flaws they find within GENERAL ORDER OF THE DIVINE SOL INC NFP’s public-facing websites. Feedback received through this program allows GENERAL ORDER OF THE DIVINE SOL INC NFP to fix flaws quickly when possible, thereby strengthening the integrity of the Department’s information technology systems and enhancing protection of government-owned data.


Responsible Disclosure Policy:

This page is for security researchers interested in reporting application security vulnerabilities. This is intended for application security vulnerabilities only.

The details within your request form will be submitted to (operated by an independent third party, Synack). If you have reported an issue determined to be within program scope and to be a valid security issue, will validate your finding and you will be allowed to disclose the vulnerability after a fix has been issued. This process is managed exclusively by through their platform, accordingly you must accept the terms of service if you wish to proceed. All queries are to be directed to and managed exclusively through the online portal.


Typical Vulnerabilities Accepted:

  • OWASP Top 10 vulnerability categories
  • Other vulnerabilities with demonstrated impact


Typical Out of Scope:

  • Theoretical vulnerabilities
  • Informational disclosure of non-sensitive data
  • Low impact session management issues
  • Self XSS (user defined payload)
  • For a full list of program scope please visit the Responsible Disclosure details page


Responsible Disclosure Guidelines:


  • Adhere to all legal terms and conditions outlined at
  • Work directly with on vulnerability submissions
  • Provide detailed description of a proof of concept to detail reproduction of vulnerabilities
  • Do not engage in disruptive testing like DoS or any action that could impact the confidentiality, integrity or availability of information and systems
  • Do not engage in social engineering or phishing of customers or employees
  • Do not request compensation for time and materials or vulnerabilities discovered 

    Source: U.S. Department of Energy


You cannot copy content of this page