Security Policy
Last Updated: 16 January 2026
We welcome reports of security vulnerabilities that may affect the confidentiality, integrity, or availability of our systems.
Scope
In-scope vulnerabilities generally include:
- Remote code execution
- Authentication or authorization bypass
- Sensitive data exposure
- Logic flaws with security impact
Out of Scope
The following issues are considered out of scope and are not eligible for response or reward:
- Clickjacking issues without demonstrable impact
- Missing or overly permissive security headers (e.g., CSP, X-Frame-Options)
- Self-XSS
- Open redirects without a clear exploit scenario
- CSRF on unauthenticated or non-sensitive actions
- Rate-limiting or brute-force issues without impact
- Reports based solely on automated scanning output
Reporting Guidelines
Please include:
- A clear description of the issue
- Steps to reproduce
- Proof of concept where applicable
- Assessment of potential impact
Do not perform testing that may disrupt service or access data belonging to other users.
Do not send encrypted archives or exploit payloads unless requested.
Contact
Please contact us by email at: [email protected]
We aim to acknowledge valid reports within a reasonable timeframe. We may not respond to reports that fall outside the scope defined in this policy.