WhatA SaaS platform that manages the entire vulnerability disclosure lifecycle — from researcher submission through embargo coordination, distro notification, patch development, and synchronized public release.
SignalMultiple commenters express frustration that the disclosure process broke down catastrophically here: an unrelated third party published the exploit during embargo, no patches or CVEs existed when the full exploit went public, and the timeline from report to weaponized-exploit-for-everyone was just 7 days. People describe this cycle as 'tiresome' and wish for a less stressful process.
Why NowDisclosure failures are accelerating as more researchers find kernel bugs (partly aided by AI/fuzzing), more parties are involved in embargoes, and the blast radius of a broken embargo is now instant global exploitation.
MarketOpen source foundations, Linux distro maintainers, enterprise security teams, and vulnerability researchers. Buyers are distro vendors (Red Hat, Canonical, SUSE) and large enterprises. Competes loosely with HackerOne/Bugcrowd but those focus on bounties, not multi-party embargo coordination.
MoatNetwork effects — the platform becomes more valuable as more distros, researchers, and maintainers participate, creating a single coordination layer that's hard to replicate once established.