The purpose of the Bug Bounty Program is to encourage security researchers and developers
to responsibly report vulnerabilities found within the platform.If a user discovers a security vulnerability in AuthVaultix.com or api.AuthVaultix.com,
they can submit a report through this program and may receive a reward for valid findings.
The goal of the bug bounty program is to improve the platform's security.
Through responsible disclosure, vulnerabilities can be fixed
and the platform can become more secure.Security researchers are encouraged to report vulnerabilities responsibly
and notify the platform team before any public disclosure.
Rewards are provided for valid vulnerability reports.- Reward: 1 Month Developer Plan
The reward is provided after the vulnerability has been verified for validity and impact.
In Scope (Allowed Targets)#
- AuthVaultix.com
- API Endpoints
Only server-side vulnerabilities are included within the scope of this bug bounty program.
- GitHub repositories
- Frontend assets (HTML / CSS / JavaScript)
- Self-XSS vulnerabilities
- Social engineering attacks
Reports related to these categories are not eligible for rewards.
Responsible Disclosure Guidelines#
When submitting a bug report, the following guidelines should be followed:- Do not damage or disrupt the system
- Avoid unauthorized access to user data
- Report vulnerabilities privately before public disclosure
- Perform only minimal testing required to prove the vulnerability
Secure Report Submission#
Submitted vulnerability reports are automatically secured using RSA encryption.- The report is stored in encrypted form
- Only the platform owner can decrypt and read the report
- Third parties or individuals with database access cannot view the report
This ensures that the data of security researchers remains protected.
Submitting a Vulnerability Report#
When submitting a report, you should provide the following information:- Severity Level
- Vulnerability Description
- Proof of Concept (PoC)
- Steps to Reproduce
- Contact Email
Including a contact email is important so the platform team can reach out for additional details if necessary.
- Low – Minor configuration issues
- Medium – Privilege escalation or security bypass
- High – Critical vulnerabilities (SQL Injection, Remote Code Execution, Data leaks)
Severity depends on the vulnerability’s impact and exploitability.
When submitting a report, it is recommended to follow this format:- Your Email
- Vulnerability Type
- Detailed Explanation
- Proof of Concept
- Steps to Reproduce
- Links to screenshots or videos
Clear and detailed reports help the team reproduce and fix vulnerabilities more quickly.
The vulnerability description field allows a maximum of 500 characters.A character counter automatically shows how many characters have been used.If additional proof or explanation is needed, external links (such as videos or screenshots) can be included.Modified at 2026-03-04 16:43:45