A vulnerability disclosure program, or VDP, is a structured process that tells security researchers how to report vulnerabilities safely and responsibly to an organization. It matters because clear reporting channels help organizations learn about weaknesses before attackers exploit them more broadly.
What is a Vulnerability Disclosure Program (VDP)?
A VDP defines how outside parties can report security findings, what systems are in scope, how the organization will respond, and what good-faith expectations apply. It is often one of the first steps toward more mature external security collaboration.
What a VDP Commonly Includes
Common elements include reporting instructions, contact methods, safe-harbor language, scope guidance, acknowledgment expectations, and coordination around remediation and disclosure timing.
VDP vs. Bug Bounty
A VDP focuses on receiving and handling vulnerability reports. A bug bounty adds defined rewards or incentives for eligible findings.
Frequently Asked Questions
Why do organizations launch VDPs?
Because researchers are more likely to report issues responsibly when there is a clear, trusted process for doing so.
Does a VDP guarantee all issues will be found?
No, but it improves the organization’s ability to receive and act on outside findings constructively.