We the undersigned organizations, members of the Hacking Policy Council, respectfully request regulatory guidance from the Office of Foreign Assets Control (OFAC) regarding coordinated vulnerability disclosure processes and sanctions. We urge the Department to clarify organizations’ obligations when receiving a cybersecurity vulnerability disclosure from individuals in “comprehensively sanctioned” countries and regions, and the organization’s ability to ask follow-up questions regarding that vulnerability. Vulnerability disclosures are communications of information, without remuneration, performed to ensure and promote the security of information systems. We commend OFAC for stating in FAQ 448 that the “U.S. government supports efforts by researchers, cybersecurity experts, and network defense specialists to identify, respond to, and repair vulnerabilities that could be exploited by malicious actors.”1 We recognize that this is aligned with the broader U.S. government policy of reducing software vulnerabilities by promoting adoption of coordinated vulnerability disclosure processes in the public and private sectors.2It would be beneficial for OFAC to clarify that such communications from individuals in comprehensively sanctioned areas are not restricted and are exempt from sanctions.

Read Next

Cairncross Outlines ONCD Priorities Under Second Trump Administration

National Cyber Director Sean Cairncross laid out his and the Trump Administration’s vision for the future of the Office of the National Cyber Director (ONCD) during remarks at the 2025 Meridian Summit in Washington DC.

Meeting the Homeland Drone Threat: A Table-Top Exercise Exposes the Gaps in Authorities and Resources

A tabletop exercise explored the threat posed by the malicious use of drones to the homeland, involving public and private sector participants responding to hypothetical attacks on an air base, electricity grid, and a local hockey game.

FedRAMP Unveils Next Phase of Modernization

ADI and FedRAMP hosted an event unveiling FedRAMP 20x Phase II, which discussed accelerating and automating cloud service authorization for federal use and cutting down time, effort, and paperwork in favor of efficiency, trust, and cybersecurity.