Product Security

Vulnerability Disclosure Policy

VDP

Last updated: April 15, 2026

1. Purpose

Cold Electric (hereinafter referred to as "the Company") is committed to ensuring the security of our products and services. We value feedback from the security research community and users, and welcome good-faith vulnerability reports.

This policy provides clear channels and procedures for vulnerability disclosure, ensuring that security issues are addressed promptly and effectively to protect our customers and their assets.

2. Scope

This policy applies to the following products and services:

If you are unsure whether your finding falls within this scope, please contact us and we will assist in making that determination.

3. Vulnerability Definition

A "security vulnerability" under this policy refers to a technical weakness that may result in:

4. Reporting Channel

If you discover a potential security vulnerability, please report it through the following channel:

Subject format: [VDP] Brief description — Product name

To protect the confidentiality of your report, we recommend using encrypted email or transmitting via TLS-encrypted connections.

If the vulnerability involves a major cybersecurity incident as defined by the Cybersecurity Management Act, the company will simultaneously initiate the statutory notification procedures.

5. Report Contents

To expedite vulnerability analysis and response, please include the following information in your report:

6. Handling Process

Upon receiving a vulnerability report, the Company will follow this process:

1

Acknowledgment

We will confirm receipt of the report within 5 business days and provide a case reference number.

2

Initial Assessment

A dedicated team will verify the vulnerability and assess its impact. Preliminary results will be communicated within 10 business days.

3

Remediation

Once confirmed, remediation work begins immediately. The timeline depends on the severity and technical complexity of the vulnerability.

4

Patch Release

After remediation, patches will be distributed via firmware or system updates.

5

Case Closure

The reporter will be notified of the resolution, and public disclosure will be made at the appropriate time.

7. Public Disclosure

The Company will disclose vulnerability information based on the following principles:

8. Safe Harbor

The Company commits to the following protections for good-faith reporters:

Our company is committed to protecting those who report in good faith. "Good faith" as used in this policy means that research and reporting activities must simultaneously meet the following requirements:

1

Legitimate Purpose

Research activities are limited to discovering, verifying, and reporting security vulnerabilities, and are not for the purpose of obtaining illicit gains, damaging the company's reputation, or engaging in unfair competition.

2

Minimization of Damage

During vulnerability verification, the "minimum necessary actions" must be taken. Stress tests, distributed denial-of-service (DDoS) attacks, or any tests that may interfere with energy storage system scheduling and energy supply stability are strictly prohibited.

3

Respect for Privacy

If, during the verification process, you accidentally come into contact with or obtain others' personal data or company business secrets, you must immediately cease operations and must not store, copy, modify, distribute, or use such information. You must proactively disclose this information in your report.

4

Procedural Compliance

Strictly adhere to the provisions of Article 9 (Precautions) of this policy, and do not disclose vulnerability details to any third party or publish them on public platforms before the vulnerability is patched.

5

Acting in Accordance with the Law

The research activities do not constitute a non-prosecution offense under the Criminal Code regarding damage to computer systems or obstruction of computer use.

For researchers who meet the above principles of good faith, our company promises not to pursue criminal prosecution or civil claims against them.

9. Reporter Guidelines

To protect the interests of all parties, reporters should observe the following:

10. Contact Information

Company: Cold Electric (Chang Gung International Energy Co., Ltd.)
Security email: security@coldelectric.com
Address: No. 55, Weiwang St., Shulin Dist., New Taipei City, Taiwan
This policy was developed with reference to vulnerability disclosure handling guidelines from IPA (Information-technology Promotion Agency) and JPCERT/CC, and meets the requirements of JC-STAR Level 1 IoT security certification.