CSIRT (Computer Security Incident Response Team) is a security team that handles cybersecurity incidents related to services provided by the companies under our management and ensures oversight of the IT infrastructure's cybersecurity.
PGP Key ID: 0xE2E296B8435B47F4
Fingerprint: 274E 05C1 3B76 3AD4 5597 4210 E2E2 96B8 435B 47F4
Phone (Mon–Fri 8 am – 6 pm): +420 250 250 500
To report security vulnerabilities, please use the dedicated contact:
Vulnerability ReportingIf you are dealing with a user issue with an application or your account, changes, renewals, forgotten passwords, or problems with receiving or sending emails, please contact our helpdesk (not the CSIRT team).
The CSIRT team oversees:
Operation and oversight of servers that ensure the operation of services for the above-mentioned companies and their customers.
Web and server applications operated within the managed infrastructure.
— not yet defined —
Domains registered to the holder NUX (Nux s.r.o.).
To report security incidents and vulnerabilities, please contact us via the security team email. For sensitive communications, please use PGP.
PGP Key ID: 0x9822C75134722D33
Fingerprint: 2D4C 7711 7D27 3652 6303 163D 9822 C751 3472 2D33
Before submitting, please check the program scope.
Report a VulnerabilityPhone (Mon–Fri 8 am – 6 pm):
+420 250 250 500
The phone is used for urgent reporting of security incidents within the managed infrastructure.
The security of our systems, customer data, and infrastructure is essential to us. If you identify a security vulnerability concerning Nux s.r.o. systems, we appreciate your responsible report. This page defines the rules of cooperation between security researchers and Nux.
Responsible testing scope includes:
Without prior written consent from CSIRT Nux, it is prohibited to:
Testing must be conducted in a manner that minimizes impact on service availability and integrity.
The report should include:
If you act in good faith, within the defined scope, and without causing intentional damage, Nux s.r.o. will not take legal action against you and will work with you to remediate the vulnerability.
Nux s.r.o. may grant a financial reward for significant security vulnerabilities. The reward is determined individually based on severity (CVSS), impact, and report quality.
| Severity | Example | Estimated Reward |
|---|---|---|
| Critical | RCE, auth bypass, privilege escalation | >20 000 CZK |
| High | SQLi, IDOR with sensitive data exposure | 10 000 - 20 000 CZK |
| Medium | Stored XSS, significant CSRF | 3 000 – 10 000 CZK |
| Low | Reflected XSS with limited impact | 1 000 – 3 000 CZK |
We reserve the right not to award a bounty if the vulnerability does not meet the program criteria.