Security Policy
Last updated: May 16, 2026
Scope
This policy applies to all properties owned and operated by The Freedom Project, LLC, including:
www.freedomproject.ai— corporate siteaim.freedomproject.ai— AIM (Architectural Insight for Modernization)arc.freedomproject.ai— ARC (Accelerated Reach & Credibility)bids.freedomproject.ai— BIDS (Business Intelligence and Discovery System)- Any other subdomain of
freedomproject.aioperated by The Freedom Project
Reporting a Vulnerability
If you discover a security vulnerability, please report it privately to:
Please do not open a public GitHub issue, post to social media, or otherwise publicly disclose the vulnerability before we have remediated it.
In your report, please include:
- The affected URL, endpoint, or component
- Clear steps to reproduce the issue
- The potential impact (data exposure, privilege escalation, etc.)
- Any proof-of-concept code, screenshots, or logs (please avoid attaching real user data)
- Your contact information and preferred name for acknowledgment, if you want credit
Our Commitment
- We will acknowledge receipt of your report within 72 hours.
- We will keep you informed of our progress as we investigate and remediate.
- We will not pursue legal action against researchers who act in good faith and follow this policy.
- With your permission, we will credit you publicly after a fix is released.
Rules of Engagement
To act in good faith under this policy, please do not:
- Perform denial-of-service (DoS / DDoS) testing of any kind
- Perform automated scanning that generates significant load on our systems
- Access, modify, or download data that is not your own
- Use social engineering against our team, customers, or vendors
- Test physical security of our premises or those of our partners
- Publicly disclose the vulnerability before we have released a fix and agreed on a disclosure date
Out of Scope
The following are generally not considered security vulnerabilities:
- Missing security headers without a demonstrated exploit
- Self-XSS or issues that require an unrealistic level of user interaction
- Best-practice recommendations without a concrete impact (e.g. SPF / DKIM / DMARC tightening)
- Rate-limiting or brute-force findings against public marketing pages
- Issues in third-party services we use (please report those to the vendor directly)
If you're unsure whether something is in scope, email us — we'd rather hear it and decline politely than miss something real.
Coordinated Disclosure
We follow coordinated-disclosure practices. We will work with you to agree on a public disclosure date once a fix is released, typically within 90 days of the initial report.
Machine-Readable Policy
A machine-readable version of this policy (per RFC 9116) is published at: