BleuIO

BleuIO

  • Get Support
  • Buy Now
  • Manual
  • AT Commands
  • Help

›More

Manual

  • How it works
  • How to use
  • Verbose Mode
  • Known Issues
  • Troubleshooting

Firmware Updates

    BleuIO Pro (SSD025)

    • Firmware Updates
    • Release History

    BleuIO (SSD005)

    • Firmware Updates
    • Release History of BleuIO (SSD005)

AT-Commands

  • List of AT Commands

BleuIO Libraries

  • JavaScript Library
  • Python Library

Scripts & Tutorials

  • Python: iBeacon
  • Python: Eddystone Beacon
  • Python: Scan
  • Python: Scan and Store
  • Python: SPS Script
  • Python: File transfer Script
  • Python: Repeater Script
  • Javascript: Google chrome.serial Beacon
  • C# Console App Example
  • C# WFA Example

Script using libraries

    Python library > v1.2.0

    • Custom Services example using Python library
    • Eddystone example using Python library
    • IBeacon example using Python library
    • Scan example using Python library
    • Scan and store example using Python library

    Python library < v1.2.0

    • Eddystone example using Python library
    • IBeacon example using Python library
    • Scan example using Python library
    • Scan and store example using Python library
    • SPS example using Python library
    • Security Example using Python library

    JS library

    • Eddystone example using Javascript library
    • IBeacon example using Javascript library
    • Scan example using Javascript library
    • Security Example using Javascript library
    • Get Device Distance

Projects

    Arduino

    • Arduino Example

    Beaglebone

    • Beaglebone Example

    Raspberry Pi

    • Raspberry PI into Beacon
    • Raspberry PI home automation

    Raspberry PI Pico

    • BleuIO integration (Part1)
    • BleuIO integration (Part2)
    • BleuIO integration (Part3)

    Renesas RA4M2

    • Signal Strength Monitoring
    • Real-Time CO2 monitor
    • Monitoring Air Quality

    STM32 Nucleo-144

    • Nucleo-144 board example
    • Smart Bulb Example

    M5Stack's CoreMP135

    • M5Stack's CoreMP135 board example

Build Your Own Firmware

  • Build Your Own Firmware
  • Advertising Example

More

  • Links
  • Vulnerability Disclosure Policy
Order Now

BleuIO

$24.99

Buy Now

Vulnerability Disclosure Policy

Introduction

BleuIO is committed to ensuring the security of its products. The objective of this Vulnerability Disclosure Policy is to provide clarity and transparency to our customers and users. This policy describes the guidelines for conducting and reporting security vulnerabilities in BleuIO products. The policy also describes the steps taken by BleuIO for responding, handling, and disclosing vulnerabilities as they are reported.

If you wish to report a potential security vulnerability, please continue reading the rest of this policy.

Scope

This policy applies to all BleuIO products.

Guidelines

  • Notify us as soon as possible after discovering a potential security vulnerability.
  • Do not take advantage of a potential security vulnerability, other than to confirm its
    existence.
  • We will not use your contact information for any purpose other than for handling the
    reported potential security vulnerability.
  • Avoid sending attachments if possible.
  • We allow anonymous reporting.
  • We currently do not offer any reward or bug bounty program.
  • Please provide information in English.

Reporting a Vulnerability

Please report any potential security vulnerabilities by submitting information to BleuIO directly via the email address linked below. If you want additional security, use our PGP Public Key.

Email address: security@smartsensordevices.com
PGP Public Key: [Link]

Please be as detailed as possible when writing your report to avoid uncertainties in communication. This way we can resolve the issue as quickly as possible.

Provide the following information in your report:

  • Contact information

    • Name
    • Organization/Company (optional)
    • Email address
    • PGP key (optional)
  • Product name, model number and version

  • Vulnerability information

    • Description of the vulnerability and potential exploits, including the type of
      vulnerability
    • Detailed instructions on how to reproduce the vulnerability step by step

Handling of a Report

Our aim is to respond to you within a reasonable timeframe informing you of our findings.

Upon receiving a report you can expect:

  1. A reply acknowledging that the report has been received

  2. We will investigate and validate the existence of a potential security vulnerability
    within 5 days of becoming aware of the report
    a. If a security vulnerability is confirmed to not exist, or we are unable to
    reproduce the potential security vulnerability: We will inform the reporter
    b. If a security vulnerability is confirmed to exist: We will inform the reporter, and
    may in specific cases, inform our customers and users, and begin working on
    a solution or mitigation

  3. When a solution or mitigation has been developed and deployed, we will disclose the
    vulnerability to the reporter and to our customers and users through appropriate
    channels, by including relevant information about the vulnerability and how to apply
    the solution or mitigating measures


← Links
  • Introduction
  • Scope
  • Guidelines
  • Reporting a Vulnerability
  • Handling of a Report

Support Request

If you have any queries or technical questions, please don't hesitate to send us a message. We will reply within 24 hours.

Message Sent!

Docs
ManualAT CommandsHelp
Community
YouTubeLinkedInFacebook
More
BleuIOSmart Sensor DevicesGitHub
Sales & Support
support@bleuio.comsales@bleuio.com
Copyright © 2025 BleuIO. A product of Smart Sensor Devices