Storage Commander Logo

Revised October 14, 2024

Responsible Disclosure Policy

Storage Commander is providing this service to help ensure a safe and secure environment for all users.

If external parties find any sensitive information, potential vulnerabilities, or weaknesses, please help by responsibly disclosing it to ResponsibleDisclosure@fullsteam.com.


This policy applies to Storage Commander hosted applications and to any other subdomains or services associated with products. Storage Commander does not accept reports for vulnerabilities which solely affect marketing websites (www.storagecommander.com), containing no sensitive data.

Security researchers must not:

Security researchers may:

Security researchers must:

  • Engage in physical testing of facilities or resources,
  • Engage in social engineering,
  • Send unsolicited electronic mail to Storage Commander users, including “phishing” messages,
  • Execute or attempt to execute “Denial of Service” or “Resource Exhaustion” attacks,
  • Introduce malicious software,
  • Execute automated scans or tools that could disrupt services, such as password guessing attacks, or be perceived as an attack by intrusion detection/prevention systems,
  • Test in a manner which could degrade the operation of Storage Commander systems; or intentionally impair, disrupt, or disable Storage Commander systems,
  • Test third-party applications, websites, or services that integrate with or link to or from Storage Commander systems,
  • Delete, alter, share, retain, or destroy Storage Commander data, or render Storage Commander data inaccessible, or,
  • Use an exploit to exfiltrate data, establish command line access, establish a persistent presence on Storage Commander systems, or “pivot” to other Storage Commander systems.
  • View or store Storage Commander nonpublic data only to the extent necessary to document the presence of a potential vulnerability.
  • Cease testing and notify us immediately upon discovery of a vulnerability,
  • Cease testing and notify us immediately upon discovery of an exposure of nonpublic data, and,
  • Purge any stored
  • Storage Commander
  • Nonpublic data upon reporting a vulnerability.

Thank you for helping to keep Storage Commander and our users safe!

Share by: