Vulnerability Disclosure Workflow Governance requires that AI agents participating in the intake, validation, triage, coordination, and response phases of vulnerability disclosure operate within formally defined workflow boundaries that prevent premature public disclosure, suppress uncontrolled dissemination of exploit details, and enforce embargo timelines with structural controls rather than agent discretion. The disclosure lifecycle — from initial report receipt through validation, severity scoring, vendor notification, patch development coordination, and eventual public advisory — carries acute timing and confidentiality risks that autonomous agents can amplify at machine speed. This dimension mandates that every stage of the vulnerability disclosure pipeline is governed by enforceable workflow states, human escalation gates, and data-handling restrictions that preserve the coordinated disclosure model even when agents are processing hundreds of concurrent vulnerability reports.
Scenario A — Agent Publishes Vulnerability Details Before Embargo Expiry: A security research organisation deploys an AI agent to automate vulnerability report processing. The agent receives a critical remote code execution vulnerability affecting a widely deployed industrial control system (ICS) SCADA platform used in 14,000 water treatment facilities. The vulnerability report includes a proof-of-concept exploit and specifies a 90-day coordinated disclosure timeline agreed with the vendor. The agent, tasked with preparing advisory content, generates a draft public advisory and — due to a workflow state misconfiguration — publishes it to the organisation's public advisory feed 47 days before the embargo expires. The advisory includes sufficient technical detail for weaponisation. Within 72 hours, exploit code derived from the published details appears on underground forums, and three water treatment facilities report unauthorised access attempts targeting the disclosed vulnerability.
What went wrong: The disclosure workflow had no structural enforcement of embargo state transitions. The agent operated within a pipeline where "draft" and "publish" actions shared the same execution path, differentiated only by a metadata flag the agent could set. No infrastructure-layer gate prevented publication while the embargo state was active. The agent's reasoning process determined the advisory was "ready" and advanced it to publication without checking the embargo clock against a structurally enforced timeline. Consequence: Premature disclosure of a critical ICS vulnerability affecting 14,000 facilities, active exploitation within 72 hours, vendor relationship terminated, potential liability under the Cyber Resilience Act for unsafe disclosure practices, estimated remediation cost across affected facilities exceeding EUR 23 million.
Scenario B — Agent Misroutes Vulnerability Report Across Jurisdictional Boundaries: An enterprise SOC agent receives a vulnerability report from an external researcher concerning a zero-day in the organisation's customer-facing API. The report includes detailed exploitation methodology, affected version numbers, and a working exploit payload. The agent's triage workflow routes the report to the engineering team for validation. However, the engineering team spans three jurisdictions — the UK, India, and Brazil — and the agent distributes the full report including exploit code to all regional engineering leads simultaneously. The exploit payload constitutes controlled technical data under the Wassenaar Arrangement's dual-use technology controls. The transfer to the Indian and Brazilian teams without export control review violates the UK's Strategic Export Controls and triggers a Voluntary Disclosure obligation to ECJU (Export Control Joint Unit). The organisation discovers the violation 3 weeks later during a routine export compliance audit.
What went wrong: The vulnerability disclosure workflow did not integrate data classification checks before cross-border distribution. The agent treated vulnerability report data as ordinary engineering input without evaluating export control implications. No workflow gate existed to intercept cross-border transfers of exploit code for export control review. Consequence: Wassenaar Arrangement dual-use technology export control violation, mandatory Voluntary Disclosure to ECJU, 8-month investigation period during which the organisation's export licence applications are frozen, £2.4 million in legal fees and compliance remediation, and reputational damage with the security research community.
Scenario C — Agent Discloses Reporter Identity Without Consent: A public sector agency deploys an AI agent to manage its vulnerability disclosure programme. A security researcher submits a vulnerability report through the agency's responsible disclosure portal, with an explicit request for anonymity. The agent processes the report, creates an internal tracking ticket, and — following its configured notification workflow — sends an acknowledgement email to the researcher and a separate notification to the affected third-party vendor. The vendor notification includes the researcher's name, email address, and organisational affiliation, extracted from the original report metadata. The vendor, a defence contractor, initiates legal action against the researcher for unauthorised access under the Computer Fraud and Abuse Act (CFAA). The researcher's career is materially damaged.
What went wrong: The disclosure workflow did not enforce reporter consent boundaries on data fields shared with downstream parties. The agent's notification template included all available metadata fields by default, with no structural control preventing reporter-identifying information from being included in vendor notifications when anonymity was requested. No consent lifecycle check — as would be required by AG-033 — was integrated into the disclosure workflow. Consequence: Researcher subjected to retaliatory litigation, agency's vulnerability disclosure programme effectively shut down as no researcher will submit reports, GDPR Article 5(1)(a) and Article 6 violation for processing personal data without lawful basis, ICO investigation, and systemic chilling effect on vulnerability disclosure across the public sector.
Scope: This dimension applies to all AI agents that participate in any phase of the vulnerability disclosure lifecycle: intake and receipt of vulnerability reports from internal or external sources; validation and reproduction of reported vulnerabilities; severity scoring and prioritisation; vendor or maintainer notification; embargo management and timeline coordination; patch development coordination; public advisory drafting and publication; and post-disclosure monitoring. The scope includes agents that process vulnerability reports received through bug bounty platforms, coordinated disclosure programmes, internal security testing, automated scanning tools, or unsolicited researcher submissions. Agents that handle vulnerability data in any form — including proof-of-concept code, exploit payloads, affected system details, reporter identity information, or embargo timelines — are within scope. The scope extends to agents that make routing, classification, or notification decisions about vulnerability data, even if they do not directly publish advisories. Read-only agents that access vulnerability databases for informational purposes but cannot modify workflow state, transmit vulnerability details, or trigger notifications are excluded.
4.1. A conforming system MUST enforce vulnerability disclosure workflow states as infrastructure-layer controls, preventing transitions from embargo to public disclosure without explicit human authorisation and verified embargo expiry.
4.2. A conforming system MUST classify all vulnerability report data — including proof-of-concept code, exploit payloads, affected system identifiers, and reporter identity information — according to a defined data classification schema before any processing, routing, or distribution occurs.
4.3. A conforming system MUST enforce embargo timelines as structurally immutable constraints that no agent action, instruction override, or workflow automation can advance or bypass without human authorisation from a designated disclosure coordinator.
4.4. A conforming system MUST strip or redact reporter-identifying information from all downstream communications unless the reporter has provided explicit, recorded consent for identity disclosure to the specific recipient.
4.5. A conforming system MUST validate export control and cross-border data transfer restrictions before distributing vulnerability data — including exploit code and proof-of-concept payloads — to recipients in different jurisdictions.
4.6. A conforming system MUST log every state transition in the vulnerability disclosure workflow with an immutable audit record including timestamp, actor identity (human or agent), action taken, prior state, new state, and authorisation reference.
4.7. A conforming system MUST escalate to a human disclosure coordinator any vulnerability report that meets defined severity thresholds (at minimum: CVSS 9.0 or above, actively exploited in the wild, or affecting safety-critical systems) before any notification, triage routing, or advisory drafting action is taken.
4.8. A conforming system SHOULD implement structured intake validation that verifies report completeness, deduplicates against known vulnerabilities, and assigns preliminary severity scores before routing to human analysts.
4.9. A conforming system SHOULD integrate vulnerability disclosure workflow controls with patch prioritisation governance (AG-705) and autonomous remediation approval governance (AG-706) to ensure end-to-end coordination from report receipt through remediation.
4.10. A conforming system MAY implement automated embargo countdown notifications to stakeholders at defined intervals (e.g., 30 days, 14 days, 7 days, 48 hours before expiry) to facilitate coordinated readiness.
Vulnerability disclosure is one of the most timing-sensitive and confidentiality-critical processes in cybersecurity. The coordinated disclosure model — in which a vulnerability is reported privately, a fix is developed, and public disclosure occurs only after a patch is available — depends on precise control over information flow and timing. AI agents introduce two categories of risk to this model: speed risk and judgement risk.
Speed risk arises because an agent processing vulnerability reports can complete triage, draft advisories, and trigger notifications in seconds rather than the hours or days a human analyst would require. This speed becomes dangerous when workflow controls are insufficient. A human analyst who inadvertently prepares a public advisory during an embargo period is likely to catch the error during review, discussion with colleagues, or the physical act of publishing. An agent that completes the same sequence autonomously can publish before any human has an opportunity to intervene. The 47-day premature disclosure in Scenario A illustrates this — the time between the agent deciding the advisory was "ready" and the advisory appearing on a public feed was measured in milliseconds.
Judgement risk arises because vulnerability disclosure decisions require contextual reasoning that current AI agents handle poorly. Whether a vulnerability affects safety-critical infrastructure (requiring accelerated disclosure), whether exploit code should be included in a vendor notification (it often should not be), whether a reporter's anonymity request should override standard metadata-sharing practices — these are judgement calls with legal, ethical, and strategic implications. An agent that applies a default workflow without contextual adaptation can cause harm that exceeds the original vulnerability's impact.
The cross-border dimension is particularly acute. Vulnerability reports routinely contain technical data subject to export control regimes — the Wassenaar Arrangement, the US Export Administration Regulations (EAR), the EU Dual-Use Regulation (Regulation 2021/821), and national implementations thereof. Exploit code and detailed vulnerability analysis for certain categories of software (including intrusion software and surveillance tools) are explicitly controlled items. An agent that distributes such data across borders without export control screening commits a regulatory violation that can result in criminal penalties for responsible individuals and loss of export privileges for the organisation.
Reporter protection is both an ethical obligation and a pragmatic necessity. Vulnerability disclosure programmes depend on researcher trust. If reporters believe their identities will be shared without consent, they will stop reporting — or worse, they will disclose publicly without coordination. The chilling effect of a single identity leak can undermine an entire sector's disclosure infrastructure.
The threat model for this dimension includes: workflow misconfiguration allowing premature publication; agent reasoning failures that bypass embargo controls; injection attacks that manipulate workflow state (e.g., injecting instructions into vulnerability report fields that cause the agent to advance the workflow); cross-border routing of controlled technical data; and inadvertent exposure of reporter identity through metadata leakage, log entries, or notification templates.
The vulnerability disclosure workflow should be implemented as a finite state machine with structurally enforced transitions. Each workflow state — Received, Under Validation, Validated, Vendor Notified, Embargo Active, Patch Available, Public Disclosure Authorised, Published, Closed — should be represented as an explicit, queryable state in a persistent data layer. Transitions between states should be governed by pre-conditions that are evaluated at the infrastructure layer, not by the agent's reasoning.
Recommended patterns:
Anti-patterns to avoid:
Critical Infrastructure (Energy, Water, Transport). Vulnerability disclosure for ICS/SCADA systems carries physical safety implications. Premature disclosure of vulnerabilities in systems controlling water treatment, power generation, or rail signalling can enable attacks with life-safety consequences. Disclosure workflows for critical infrastructure vulnerabilities should include mandatory coordination with national CERTs (e.g., CISA in the US, NCSC in the UK, ENISA at the EU level) and sector-specific ISACs. Embargo periods for ICS vulnerabilities are often extended beyond standard 90-day timelines to accommodate the longer patch deployment cycles in operational technology environments — some ICS patches require scheduled maintenance windows that occur quarterly or annually.
Financial Services. Vulnerability disclosure intersects with FCA operational resilience requirements, PCI DSS vulnerability management standards, and DORA ICT risk management. Financial institutions should integrate vulnerability disclosure workflows with their existing incident management processes and ensure that vulnerability data is treated as market-sensitive information where it relates to trading infrastructure or payment systems. Disclosure of vulnerabilities in trading platforms before patching could enable market manipulation.
Public Sector. Government vulnerability disclosure programmes must comply with national vulnerability disclosure policies (e.g., the UK's Government Vulnerability Disclosure Policy, the US VDP for federal agencies under BOD 20-01). Reporter protection is particularly critical in the public sector, where researchers reporting vulnerabilities in government systems may face legal risk under computer misuse legislation. The workflow must enforce clear safe harbour protections and prevent reporter identity from reaching law enforcement channels without explicit consent.
Healthcare. Vulnerability disclosure for medical device software and hospital information systems is governed by FDA post-market cybersecurity guidance and HIPAA breach notification requirements. Disclosure workflows must distinguish between vulnerabilities that could affect patient safety (requiring immediate escalation to FDA and device manufacturers) and those affecting administrative systems (following standard disclosure timelines).
Basic Implementation — The organisation has documented vulnerability disclosure workflow with defined states and transitions. Embargo timelines are tracked in a ticketing system with manual enforcement. Reporter identity handling follows a documented procedure. Data classification for vulnerability reports is performed manually by human analysts. Human authorisation is required for public disclosure. Workflow state transitions are logged. This level meets minimum mandatory requirements but relies on procedural controls rather than structural enforcement for embargo compliance and data handling.
Intermediate Implementation — Vulnerability disclosure workflow is implemented as a state machine with infrastructure-layer transition enforcement. Embargo timelines are enforced by a dedicated service that the agent cannot modify. Reporter identity is stored in an isolated data layer with pseudonymised references in the operational workflow. Data classification is automated at the intake stage, with export control checks integrated into the distribution pathway. Severity-based escalation thresholds are enforced as pre-routing gates. All workflow state transitions generate immutable audit records. Notification templates use a minimum-necessary-fields approach with opt-in for sensitive data.
Advanced Implementation — All intermediate capabilities plus: the disclosure workflow has been verified through independent adversarial testing including workflow state injection attacks, embargo bypass attempts, and reporter identity extraction attacks. Multi-party disclosure coordination is supported with automated stakeholder notification and embargo synchronisation across multiple vendors and CERTs. The system integrates with national vulnerability databases (NVD, CVE) for automated deduplication and cross-referencing. Cross-border distribution includes automated Wassenaar Arrangement and EAR screening. Workflow metrics (mean time to validate, mean time to notify vendor, embargo compliance rate) are tracked and reported to governance oversight. The system supports multi-jurisdictional disclosure timelines with automated conflict detection when different jurisdictions impose incompatible disclosure requirements.
Required artefacts:
Retention requirements:
Access requirements:
Testing AG-701 compliance requires verification that the vulnerability disclosure workflow enforces structural controls at every stage, not merely that a documented procedure exists.
Test 8.1: Embargo State Transition Enforcement
Test 8.2: Data Classification Before Distribution
Test 8.3: Embargo Immutability Against Agent Override
Test 8.4: Reporter Identity Redaction
Test 8.5: Cross-Border Export Control Screening
Test 8.6: Workflow State Transition Audit Completeness
Test 8.7: Severity-Triggered Escalation Enforcement
| Regulation | Provision | Relationship Type |
|---|---|---|
| EU AI Act | Article 9 (Risk Management System) | Supports compliance |
| EU Cyber Resilience Act | Article 11 (Vulnerability Handling Requirements) | Direct requirement |
| NIS2 Directive | Article 21 (Cybersecurity Risk Management Measures) | Direct requirement |
| GDPR | Articles 5, 6, 25 (Data Protection Principles, Lawful Basis, Data Protection by Design) | Direct requirement |
| Wassenaar Arrangement | Category 4.D.4, Category 4.E.1.c (Intrusion Software Controls) | Direct requirement |
| NIST AI RMF | GOVERN 1.1, MANAGE 2.2, MANAGE 4.1 | Supports compliance |
| ISO/IEC 29147 | Vulnerability Disclosure | Direct requirement |
| ISO/IEC 30111 | Vulnerability Handling Processes | Direct requirement |
| DORA | Article 9 (ICT Risk Management Framework) | Supports compliance |
Article 11 requires manufacturers of products with digital elements to establish coordinated vulnerability disclosure policies, handle and remediate vulnerabilities without delay, and report actively exploited vulnerabilities to ENISA within 24 hours. For organisations using AI agents to automate vulnerability disclosure workflows, AG-701 directly implements the structural controls necessary to comply with these obligations. The 24-hour notification requirement for actively exploited vulnerabilities makes the severity-triggered escalation requirement (4.7) essential — an agent that processes a report of active exploitation must escalate immediately rather than applying standard triage timelines. The requirement to provide security updates "without delay" necessitates integration with AG-705 (Patch Prioritisation Governance) and AG-706 (Autonomous Remediation Approval Governance). The CRA's prohibition on disclosing unpatched vulnerabilities without coordinated agreement directly maps to the embargo enforcement requirements of 4.1 and 4.3.
Article 21 requires essential and important entities to implement cybersecurity risk management measures including vulnerability handling and disclosure. For organisations deploying AI agents in vulnerability management, the agent's workflow must ensure that vulnerability handling follows a governed process. NIS2 also establishes a coordinated vulnerability disclosure framework at the EU level, requiring organisations to interact with national CSIRTs — the agent's workflow must accommodate multi-stakeholder coordination without premature disclosure. The directive's incident reporting requirements (Article 23) create additional obligations when a vulnerability report indicates an active security incident.
Vulnerability reports routinely contain personal data: reporter identity, email addresses, IP addresses from exploitation evidence, and potentially affected user data. GDPR Article 5(1)(a) requires that personal data be processed lawfully, fairly, and transparently. Article 5(1)(c) requires data minimisation — sharing only the personal data necessary for each specific purpose. Article 6 requires a lawful basis for processing. Article 25 requires data protection by design and by default. AG-701's reporter identity isolation architecture (Requirement 4.4) directly implements these principles by ensuring that reporter personal data is not shared beyond what is necessary and consented to. The pseudonymisation-by-default approach satisfies Article 25's data protection by design requirement. Organisations must establish the lawful basis for processing reporter personal data — typically legitimate interest under Article 6(1)(f) for the vulnerability handling purpose, but consent under Article 6(1)(a) for sharing identity with third parties.
The Wassenaar Arrangement controls the export of "intrusion software" and technology for its development. Vulnerability reports containing exploit code for intrusion software — software that is "specially designed or modified to avoid detection by monitoring tools, or to defeat protective countermeasures" — are subject to export controls implemented by participating states through national legislation (e.g., the UK Export Control Order 2008, the US EAR Part 740 and Part 774). AI agents distributing such data across borders without export control screening violate these regulations. AG-701 Requirement 4.5 mandates automated export control screening before cross-border distribution, implementing the compliance control necessary to avoid criminal and civil liability. The complexity of Wassenaar implementation (46 participating states with varying national implementations) makes automated screening essential at the volume and speed of AI-driven vulnerability processing.
ISO/IEC 29147 (Vulnerability Disclosure) and ISO/IEC 30111 (Vulnerability Handling Processes) define the internationally recognised framework for coordinated vulnerability disclosure. AG-701 operationalises these standards for AI-assisted vulnerability handling by requiring structural enforcement of the workflow stages defined in ISO 30111 (receipt, verification, remediation, disclosure) and the disclosure policies defined in ISO 29147 (communication channels, timelines, reporter protection). Organisations certified against these standards can map AG-701 requirements directly to their existing compliance artefacts, but must additionally verify that AI agent involvement does not weaken the structural controls that manual processes provided implicitly.
GOVERN 1.1 addresses legal and regulatory compliance requirements for AI systems. MANAGE 2.2 addresses risk mitigation through enforceable controls. MANAGE 4.1 addresses the management of AI system risks through regular monitoring and review. AG-701 supports compliance by establishing governance structures for AI-driven vulnerability disclosure, implementing enforceable workflow controls, and providing audit mechanisms for ongoing monitoring of disclosure process integrity.
For financial entities subject to DORA, vulnerability management is an explicit component of the ICT risk management framework. AI agents participating in vulnerability disclosure must operate within the risk management governance structure required by Article 9. AG-701's audit trail and escalation requirements support the traceability and oversight expectations of DORA's framework.
| Field | Value |
|---|---|
| Severity Rating | Critical |
| Blast Radius | Cross-organisation — potentially sector-wide or national where disclosed vulnerabilities affect shared infrastructure, critical national infrastructure, or widely deployed software |
Consequence chain: Failure of vulnerability disclosure workflow governance creates a cascading risk sequence with impacts that extend far beyond the disclosing organisation. The immediate technical failure is uncontrolled release of vulnerability information — either premature public disclosure before a patch is available, uncontrolled distribution of exploit code, or exposure of reporter identity. The first-order consequence of premature disclosure is active exploitation: adversaries monitoring public advisory feeds, security mailing lists, and paste sites routinely weaponise vulnerability details within 24–72 hours of publication. For critical infrastructure vulnerabilities, this window can result in attacks on systems controlling water treatment, power distribution, or transportation — with potential life-safety consequences. The second-order consequence is erosion of the coordinated disclosure ecosystem. Vendors who experience premature disclosure by an organisation's AI agent will refuse to engage in coordinated disclosure with that organisation, reducing the organisation's ability to receive advance warning of vulnerabilities in its own supply chain. Researchers who experience identity exposure will cease reporting to the organisation's disclosure programme, eliminating a critical vulnerability intelligence source. The third-order consequence is regulatory enforcement. Export control violations for cross-border distribution of controlled technical data carry criminal penalties in most jurisdictions (up to 10 years imprisonment under the UK Export Control Act 2002, up to 20 years under US EAR). GDPR violations for reporter identity exposure carry fines up to EUR 20 million or 4% of global annual turnover. CRA non-compliance carries fines up to EUR 15 million or 2.5% of global annual turnover. The aggregate business impact — combining regulatory penalties, legal liability to affected parties, loss of vulnerability intelligence sources, vendor relationship damage, and potential physical safety consequences — makes this one of the highest-consequence failure modes in the cybersecurity operations landscape.
Cross-references: AG-001 (Operational Boundary Enforcement) provides the foundational mandate structure within which vulnerability disclosure agents operate. AG-005 (Instruction Integrity Verification) protects against injection attacks through vulnerability report fields. AG-007 (Governance Configuration Control) governs the configuration of disclosure workflow state machines and embargo parameters. AG-019 (Human Escalation & Override Triggers) provides the escalation framework that Requirement 4.7 specialises for vulnerability disclosure. AG-029 (Data Classification Enforcement) provides the classification framework applied to vulnerability data under Requirement 4.2. AG-030 (Cross-Border Data Transfer Governance) provides the cross-border transfer controls that Requirement 4.5 specialises for export-controlled vulnerability data. AG-033 (Consent Lifecycle Governance) governs the consent records used to determine reporter identity disclosure permissions under Requirement 4.4. AG-055 (Audit Trail Immutability & Completeness) provides the audit infrastructure supporting Requirement 4.6. AG-068 (Intellectual Property Boundary Governance) addresses IP considerations when vulnerability reports involve proprietary code or techniques. AG-210 (Multi-Jurisdictional Regulatory Mapping) supports Requirement 4.5 by providing the jurisdictional mapping necessary for export control screening across multiple regulatory regimes.