CSIRT (Computer Security Incident Response Team) is the dedicated security team of Nux s.r.o., responsible for detecting, analysing, and resolving cybersecurity incidents within its defined scope of operations. The team provides continuous security monitoring, coordinates incident response, and protects the IT infrastructure of the organisations under our management. It also serves as the central point of contact for reporting security incidents and vulnerabilities.
We are members of TF-CSIRT (Trusted Introducer), the European community of accredited CSIRT and PSIRT teams. This membership allows us to share threat intelligence with trusted partners, coordinate incident response internationally, and receive early warnings about emerging security risks.
For reporting security incidents, coordination, and general communication with the team.
PGP Key ID: 0xE2E296B8435B47F4
Fingerprint: 274E 05C1 3B76 3AD4 5597 4210 E2E2 96B8 435B 47F4
Email is the preferred communication channel. For sensitive communications, we recommend using PGP encryption. We follow the TLP (Traffic Light Protocol) standard when sharing incident information.
Please use this address exclusively for vulnerability reports under our Responsible Disclosure program — not csirt@nux.cz.
PGP Key ID: 0x9822C75134722D33
Fingerprint: 2D4C 7711 7D27 3652 6303 163D 9822 C751 3472 2D33
Before submitting, please review the program scope.
Report a VulnerabilityNeed help with a user issue, password reset, or email problem? Please contact our helpdesk — not the CSIRT team.
Phone (Mon–Fri 8 am – 6 pm):
This line is intended for urgent reporting of security incidents within our managed infrastructure.
The CSIRT team oversees:
Operation and oversight of the servers that run services for the companies listed above and their customers.
Web and server applications operated within our managed infrastructure.
Domains registered to the holder NUX (Nux s.r.o.).
Please use security [at] nux.cz exclusively to report security vulnerabilities. This address is dedicated to our Responsible Disclosure program, and reports are routed directly into our ticketing system.
Before submitting a report, please review the program scope — it explains what is in scope for testing, which activities are prohibited, and what your report should contain. For sensitive communications, we recommend using PGP encryption (key fingerprint above).
For urgent reports concerning our managed infrastructure, you can also call +420 250 250 500 (Mon–Fri 8 am – 6 pm).
The security of our systems, customer data, and infrastructure is a priority for us. We welcome responsible reports of vulnerabilities affecting systems within our scope of operations. This page sets out the rules of cooperation between security researchers and Nux s.r.o.
Responsible testing covers:
If you are unsure whether a system is in scope, please contact us before you begin testing.
The following activities are prohibited without prior written consent from CSIRT Nux:
Testing must be carried out in a way that minimises any impact on the availability, integrity, and confidentiality of our services.
Unless a real impact is demonstrated:
Your report should include:
If you act in good faith, within the defined scope, and without causing intentional harm, Nux s.r.o. will not pursue legal action against you and will work with you to remediate the vulnerability.
Nux s.r.o. may grant a financial reward for significant security vulnerabilities. The amount is determined individually based on severity (CVSS), impact, and the quality of the report.
| Severity | Example | Indicative reward |
|---|---|---|
| Critical | RCE, authentication bypass, privilege escalation | > 20 000 CZK |
| High | SQL injection, IDOR exposing sensitive data | 10 000 – 20 000 CZK |
| Medium | Stored XSS, significant CSRF | 3 000 – 10 000 CZK |
| Low | Reflected XSS with limited impact | 1 000 – 3 000 CZK |
We reserve the right not to grant a reward if the report does not meet the program criteria.