Vulnerability Disclosure Policy

At, we take security and privacy issues very seriously. Our team is busy improving the systems and processes. This helps to protect the our client data and also ensures the continuity of our services. However, this does not mean that our systems are immune to problems. If problems are detected, we would like your help. The responsible disclosure of security vulnerabilities helps us ensure the security and privacy of our end-consumers.

Security Researchers should…

  • Respect the rules. Operate within the rules set forth by the this policy, or speak up if in strong disagreement with the rules.
  • Respect privacy. Make a good faith effort not to access or destroy another user’s data.
  • Be patient. Make a good faith effort to clarify and support their reports upon request.
  • Do no harm. Act for the common good through the prompt reporting of all found vulnerabilities. Never willfully exploit others without their permission.

⚠️  NOTE: You are testing on production. Behaviour that compromises the stability and integrity of the site is out of scope. For example, do not target other user’s data (use one of your other sets of credentials), delete/remove/edit parts of the site, engage any sort of DoS attack, and/or compromise any target’s ability to function for other users. If you believe that you have found a vulnerability of this nature, please stop further testing and report it.

Program Rules:

  • Notify us as soon as you discover a potential security vulnerability.
  • Do not share details of the suspected vulnerability publicly or with any third party.
  • Only use or access accounts and information that belong to you.
  • Do not destroy or modify data that is not yours.
  • Do not degrade the performance of products and services or our users.
  • Do not perform social engineering, physical, or denial of service attacks on personnel, locations, or assets.
  • Do not try to repeatedly access the system and do not share the access obtained with others.


This program applies to products, services, and systems. Always be careful to verify whose assets you are testing while performing research. Assets in scope for this program are:


How to Report a Vulnerability

If you have detected a vulnerability, then please send your reports with POCs and steps to reproduce on

Reporting format :

	[Issue Name]

	[Issue Description]

**Affected Resource:** 
	[URL / IP / Endpoint]

**Proof of Concept (PoC):** 
	[Step by Step PoC for replication]

**Attachment (Preffered):** 
	[Proofs - screenshot or video]

What we would like to see from you

To help us triage and remediate potential findings, a good vulnerability report should:

  • Describe the vulnerability, precisely where it was discovered, and the real-world impact.
  • Offer a detailed description of the steps needed to reproduce the vulnerability (POCs, screenshots, and videos are helpful).
  • Please include one vulnerability per report (unless in an attack chain).
  • Don’t report automated scanner results without proof of exploitability.

⚠️  NOTE: Vulnerabilities reported without any POC (Proof of Concept) and Steps to Reproduce will not be considered for this reward program.

What you can expect from us

When you choose to share your contact information with us, we commit to coordinating with you as openly and as quickly as possible.

  • Within 7 business day, we will acknowledge that your report has been received.
  • To the best of our ability, we will confirm the existence of the vulnerability to you and be as transparent as possible about the remediation process, including on issues or challenges that may delay resolution.
  • When you follow the guidelines that are laid out above, we will not pursue or support any legal action related to your research.
  • If you are the first to report a “qualifying vulnerability” in accordance with this Policy, we would like to recognise your contribution on our Security Researcher Wall of Fame and/or with a reward.

⚠️  NOTE: To qualify for bounty, the security bug must be original and previously unreported, and must be reported to and only


  • Third-Party Integrations
  • Any sort of brute-force attacks
  • Web / API :
    1. Account/e-mail enumeration using brute-force attacks
    2. Any low impact issues related to session management (i.e. concurrent sessions, session expiration, password reset/change log out, etc.)
    3. Client-side application/browser autocomplete or saved password/credentials
    4. Incomplete or missing SPF/DMARC/DKIM records
    5. Lack of SSL or Mixed content
    6. Login/Logout/Unauthenticated/Low-impact CSRF
    7. Low impact Information disclosures (including Software version disclosure)
    8. Missing Cookie flags
    9. SSL/TLS best practices that do not contain a fully functional proof of concept
    10. Valid bugs or best practice issues that are not directly related to the security posture of the client
    11. Vulnerabilities affecting users of outdated browsers, plugins or platforms. For example, an XSS reliant on Adobe Flash (no longer supported)
    12. SSL Weak Ciphers/ POODLE / Heartbleed
    13. Clickjacking, Phishing or any form of Social Engineering Attack
    14. Findings from applications or systems not listed in the ‘In Scope’ section.
    15. Attacks requiring MITM or physical access to a user’s device.
    16. Clickjacking on pages with no sensitive actions.
    17. Any activity that could lead to the disruption of our service (DoS).
    18. Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS.
    19. Rate limiting or bruteforce issues on non-authentication endpoints.
    20. Tabnabbing.
    21. Anything not permitted by applicable law
    22. Missing DNSSEC settings.
    23. Self XSS.
    24. Missing HTTP security headers (CSP, HSTS, etc.).

    We reserve the right to consider vulnerabilities in third party software as being in or out of scope.

⚠️  NOTE: Anything Out-of-Scope can still be reported, however, its acceptance for rewards under VDP will be at sole discretion of the Security Team.