Recently, while using a certain Web service, I felt a "technical discomfort" and, after investigation, discovered a potential vulnerability. I reported it using the Vulnerability Reporting System of IPA (Information-technology Promotion Agency, Japan), and it was formally accepted. In this article, while keeping the details themselves private, I will introduce the sequence of events and the significance of reporting to public institutions.
1. Trigger of Discovery
I was using an online container exercise environment as part of my routine learning of new technologies and cloud environments.
The starting point was when I felt a "small discomfort" in the startup logs and behavior. It was something that general users might not notice, but an engineer sensitive to security would pick up on. Trusting my intuition, I proceeded with a more detailed investigation.
2. Verification Overview (Details Private)
Although I will omit the details in this chapter, I proceeded with verification in the following flow.
- Construction of reproduction environment
- Log confirmation and behavior observation
- Check of permission settings and network behavior
Technical procedures and specific setting values are handled in the coordination process with the service operator and IPA, so I dare to withhold them in this article.
3. Reporting Process to IPA
After discovering the vulnerability, I submitted the following to the IPA reporting form.
- Overview of impact scope
- Key points of reproduction procedure (details are private)
- Assumed abuse scenarios
- Contact information
A few days after sending, I received an acceptance confirmation email. A handling number was assigned, and we proceeded to the formal investigation and coordination phase.
4. Issuance of Acceptance Certificate
A few weeks later, a "Vulnerability Related Information Report Acceptance Certificate" was issued by IPA.

5. Social Contribution through Public Reporting
Vulnerabilities pose a risk of damage expansion if left unattended.
The fact that "good-willed discoverers" can report with peace of mind using the IPA framework is an important mechanism that raises the level of information security in Japan. I am proud that my own actions have become a help to protect many people, not just a place for learning.
Conclusion: Introduction to Leach Generative AI Advisory
In system development and operation, "security" and "utilization of the latest technology" are two wheels of a cart.
At Leach Generative AI Advisory, we provide:
- Support for introducing cutting-edge technologies including Generative AI
- Security diagnosis and vulnerability response
- Emergency advisory
We provide these services in a one-stop shop. We will build a safe and secure system and boost business growth.
Please feel free to consult us.


