Bountytalk Launched

Author Topic: Relaso Bug Bounty  (Read 75 times)


  • Moderator
  • Experienced Member
  • *****
  • Posts: 357
    • View Profile
Relaso Bug Bounty
« on: July 31, 2023, 05:46:22 PM »
submit bug report:

Vulnerability Reporting Policy
The security team acknowledges the valuable role that independent security researchers play in Internet security. Keeping our customers’ data secure is our number-one priority, and we encourage responsible reporting of any vulnerabilities that may be found in our site or application. is committed to working with the security community to verify and respond to any potential vulnerabilities that are reported to us. Additionally, pledges not to initiate legal action against security researchers for penetrating or attempting to penetrate our systems as long as they adhere to the conditions below.

Testing for security vulnerabilities
Conduct all vulnerability testing against Trial or Developer Edition organizations (instances) of our online services to minimize the risk to our customers’ data.

Reporting a potential security vulnerability
Privately share details of the suspected vulnerability with by sending an email to [email protected]
Provide full details of the suspected vulnerability so the security team may validate and reproduce the issue does not permit the following types of security research
Causing, or attempting to cause, a Denial of Service (DoS) condition
Accessing, or attempting to access, data or information that does not belong to you
Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you

The security team commitment
To all security researchers who follow this Vulnerability Reporting Policy, the security team commits to the following:

To respond in a timely manner, acknowledging receipt of your report

To provide an estimated time frame for addressing the vulnerability
To notify the reporting individual when the vulnerability has been fixed

No compensation does not compensate people for reporting a security vulnerability, and any requests for such compensation will be considered a violation of the conditions above. In such an event, reserves all of its legal rights.