-
๐ Report Security Issues
If you discover a security vulnerability on zetsylook.com, we encourage you to notify us immediately. We review all legitimate vulnerability reports and will do our utmost to resolve issues promptly. Before reporting, please carefully review this document, including our fundamentals, bounty program, reward guidelines, and what should not be reported.
๐ Fundamentals
If you follow the principles below when reporting a security issue to zetsylook.com, we will not initiate legal action or enforcement against you in response to your report.
We ask that you:
-
โณ Give us reasonable time to review and fix the issue you report before publicly disclosing or sharing the information with others.
-
๐ซ Do not interact with any private accounts (including modifying or accessing data) without explicit consent from the account owner.
-
๐ค Make a good faith effort to avoid privacy violations and disruptions to others, including but not limited to data destruction or service interruptions.
-
โ Do not exploit the security issue for any reason, including demonstrating additional risk (such as attempting to access sensitive company data or seeking other vulnerabilities).
-
โ๏ธ Comply with all applicable laws and regulations.
๐ฐ Bounty Program
We recognize and reward security researchers who help keep our platform safe by reporting vulnerabilities. Monetary rewards are at the sole discretion of zetsylook.com, based on risk, impact, and other factors. To be eligible for a bounty, you must:
-
Follow our fundamentals listed above.
-
Report a valid security bug: a vulnerability in our services or infrastructure that poses a security or privacy risk. (Note: We ultimately determine the severity of the issue; not all bugs qualify as security vulnerabilities.)
-
Submit your report through our official security center. Please do not contact individual employees.
-
Disclose if you accidentally cause a privacy violation or service disruption (e.g., accessing account data or confidential configurations) while investigating the issue.
-
Understand that we review and respond to valid reports based on priority and severity, which may take some time.
-
Accept that we reserve the right to publish vulnerability reports, respecting privacy as appropriate.
๐ Rewards
Rewards are based on the impact of the vulnerability. We update the program regularly based on feedback. Please share any suggestions for improvement.
-
Provide detailed, reproducible reports. Issues without enough detail will not qualify for a bounty.
-
In case of duplicates, the first fully reproducible report is awarded.
-
Multiple vulnerabilities stemming from the same root cause are considered one bounty.
-
Bounty amounts are determined by factors such as impact, exploitability, and report quality.
Maximum payout per severity level:
Severity Max Reward Examples ๐ด Critical ($200) Privilege escalation, remote code execution, financial theft Remote Code Execution, Admin Access, SQL Injection leaking sensitive data ๐ High ($100) Platform security risks impacting core processes Lateral auth bypass, Stored XSS, Local file inclusion, Disclosure of sensitive corporate info ๐ก Medium ($50) Affects multiple users, minimal user interaction required Logic flaws, insecure object references ๐ข Low Affects individual users, requires interaction or complex prerequisites (e.g., MITM) Open redirect, Reflective XSS, Low sensitivity info leaks
๐ Customer Contact 24/7
-
Phone: +1234567890
-
Email: [email protected]
-
Address: 425 SE Holly Way, McMinnville, OR 97128, United States
-