Cloud Imperium Games
Vulnerability Disclosure Policy

Our Values

Cloud Imperium Games is committed to ensuring the security of its assets and backers’ personal information by protecting this data from unwarranted disclosure. This policy is intended to give security researchers clear guidelines for conducting vulnerability discovery activities and to convey our preferences in how to submit these discoveries to us.

We want security researchers to feel comfortable reporting vulnerabilities they’ve discovered – as set out in this policy – so we can fix them and protect user data. We have developed this policy to reflect our values and uphold our sense of responsibility to security researchers who share their expertise with us as we continue our mission to developing the Star Citizen Universe.


This policy applies to the following products of Roberts Space Industries and Cloud Imperium Games, including all software and hardware systems:

Any product not expressly listed above are excluded from scope and are not authorized for testing. Additionally, vulnerabilities found in the systems from our vendors fall outside of this policy’s scope and should be reported directly to the vendor according to their disclosure policy (if any). If you are unsure whether a particular system is in scope, contact us at before beginning your research.

Though we develop and maintain other internet-accessible systems or services, we ask that active research and testing only be conducted on the systems and services covered by the scope of this document. If there is a particular system not in scope that you think merits testing, please contact us to discuss it first. We will increase the scope of this policy over time.

The following test types are not authorized:


If you make a good faith effort to comply with this policy during your security research, we will consider your research to be authorized, we will work with you to understand and resolve the issue quickly, and Cloud Imperium Games will not recommend or pursue legal action related to your research.

Guidelines for Reporting

We accept vulnerability reports via

We request that you:

In order to help us prioritize submissions, we recommend that your reports:

Our Promise to You

When you choose to share your research with us, we commit to coordinating with you as openly and as quickly as possible.