If you believe you have discovered a security issue within our web application or API, we highly encourage you to report it to us. We appreciate the efforts of ethical hackers and reward those who responsibly disclose vulnerabilities.

Please submit any vulnerability or bug discovered via this form: https://forms.gle/NTK3FGMYRsAWKkY4A

We value transparency and will work with you to resolve any legitimate issues found. Your efforts help us maintain the security and trustworthiness of our platform. Thank you for your contribution to our security.

The rubric we use to determine bug bounties is as follows:

LevelExampleMaximum Bug Bounty
6. SevereUnauthorized access to any part of the platform - Ability to delete or manipulate user data or analyticsLet’s talk
5. CriticalUnauthorized ability to execute arbitrary code on the server- Exploiting API endpoints to access restricted dataUp to $10,000
4. HighSQL injection leading to data exfiltration- Bypassing authentication mechanismsUp to $5,000
3. MediumCross-site scripting (XSS)- CSRF that affects user accountsUp to $2,000
2. LowSecurity misconfigurations- Information leakage (server info, stack traces)Up to $500
1. NoneSuggestions for improvements or best practices