Copenhagen AI
CPH.AI
Approach
Capabilities
Insights
Research Institute
Copenhagen AI
COPENHAGEN AI
ENGINEERING EXCELLENCECREATIVE RENAISSANCEHYPER OPTIMIZATION

We function as the strategic bridge between sovereign infrastructure and autonomous intelligence. Bridging the gap between frontier breakthroughs and systematic industrial execution.

The AI Suite

  • Runestone
  • Bedrock
  • Ledger
  • Vector
  • Aegis
  • Prism

Institute

  • Academic Partnerships
  • Open Source
  • Research Blog

Careers

  • Open Roles
  • The Residency
  • Interviewing
  • Culture
Global Offices
© 2026 Kæraa Group. All Rights Reserved.
Terms of Service|Privacy Policy|Responsible Disclosure|Accessibility Statement
Security Protocol 00
Status: Active

Responsible
Disclosure Policy

At Copenhagen AI, we are committed to maintaining the security and integrity of our systems. We understand the importance of protecting our clients' and partners' data and encourage the responsible reporting of any security vulnerabilities.

Scope & Guidelines

This policy applies to any security vulnerabilities you believe you have discovered in any product, service, or application provided by Copenhagen AI. We request that all researchers adhere to the following guidelines:

Detailed Reporting

Provide detailed reports with reproducible steps or a clear description of what you have found. Please include any scripts or data that might help us understand the vulnerability.

Non-Destructive Testing

Avoid violating privacy, destroying data, or interrupting or degrading the Copenhagen AI service during your research.

Confidentiality

Do not disclose the issue to others until it has been resolved by our team.

Zero Exploitation

Do not exploit a security issue you have discovered for any reason. This includes demonstrating additional risk, such as attempting unauthorized access to data or probing for additional issues.

Reporting Protocol

We value your input and your efforts to make our systems secure. Please report possible security vulnerabilities directly to our dedicated security team.

Secure Uplink
security@cph.ai

Include as much information as possible to help us understand the nature and scope of the potential issue.

PGP Public Key
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=AkD3
-----END PGP PUBLIC KEY BLOCK-----
Fingerprint: 5FFB0CFD737202AE2F0024B346D911B7B646E5DB

Our Commitment

Response Time
Timely Analysis

We strive to address all reported issues in a timely manner and validate findings quickly.

Communication
Open Dialogue

We commit to communicating openly with the security community to improve our technology.