security.txt - documentation
  • Custom security.txt Implementation Guide

Custom security.txt Implementation Guide

Quick Start

  1. Create a text file named security.txt
  2. Add the required fields (Contact and Expires)
  3. Add any optional fields that are relevant to your organization
  4. Place the file in the .well-known directory of your website
  5. Ensure it's accessible at https://example.com/.well-known/security.txt
  6. Make sure to keep the file updated and review it periodically

Fields Explanation

Below is our recommended default template for a security.txt file:

# Organization Name
Contact: mailto:security@example.com
Expires: YYYY-MM-DDT00:00:00.000Z
Preferred-Languages: en

Required and Optional Fields

A standard security.txt file contains several fields:

FieldRequiredDescription
ContactRequiredEmail address, phone number, or web page URL for reporting vulnerabilities
ExpiresRequiredThe date after which the security.txt file should be considered stale
EncryptionOptionalLink to a key to be used for encrypted communication
AcknowledgmentsOptionalLink to a page where security researchers are recognized
Preferred-LanguagesOptionalA comma-separated list of language codes
CanonicalOptionalThe URLs for accessing this security.txt file
PolicyOptionalLink to the security policy page
HiringOptionalLink to security-related job positions
Last Updated: 7/4/25, 9:39 AM
Contributors: Mario Ofner