Report Vulnerability
Responsibly disclose security vulnerabilities. We follow ethical disclosure practices.
Disclosure Guidelines
Be Detailed
Provide comprehensive information about the vulnerability
Include Proof
Attach proof of concept or evidence when possible
No Personal Data
Do not include sensitive personal information
Allow Time for Fix
Allow reasonable time for the issue to be addressed
Frequently Asked Questions
How long does review take?
Typically 3-7 business days. You will be notified via email if provided.
Is my identity protected?
Yes, we never disclose reporter identities without explicit permission.
What types of vulnerabilities do you accept?
SQL injection, XSS, data leaks, authentication bypass, sensitive data exposure, etc.