Back to Home

Responsible Disclosure

Last Updated: December 06, 2025

🤝 Thank You for Helping Us: We welcome responsible security researchers to help us maintain the security of Cryptoffsize. If you discover a vulnerability, please report it responsibly.

1. Program Overview

Cryptoffsize's Responsible Disclosure Program encourages security researchers to report vulnerabilities they discover in our Platform. We are committed to working with the security community to verify and address reported vulnerabilities promptly.

1.1 Our Commitment

When you report a vulnerability to us responsibly, we commit to:

2. Scope

2.1 In Scope

✅ Report these vulnerabilities:

2.2 Out of Scope

❌ Do NOT report these:

3. Rules of Engagement

3.1 What You Can Do

✓ Allowed

3.2 What You Cannot Do

✗ Prohibited

4. How to Report

4.1 Reporting Process

  1. Contact Us: Report via our support system with "SECURITY VULNERABILITY" in subject
  2. Provide Details: Include all relevant information (see below)
  3. Wait for Response: We'll acknowledge within 48 hours
  4. Collaborate: Work with us to verify and understand the issue
  5. Give Us Time: Allow reasonable time for remediation before disclosure

4.2 What to Include

A good vulnerability report should include:

4.3 Report Template

Example Report Format:

Subject: [SECURITY VULNERABILITY] SQL Injection in Login Form

Vulnerability Type: SQL Injection
Severity: High
Location: https://Cryptoffsize.com/login.php
Parameter: email field

Description: The login form does not properly sanitize user input in the email field, allowing SQL injection attacks.

Steps to Reproduce:
1. Navigate to login page
2. Enter ' OR '1'='1 in email field
3. Enter any password
4. Click login
5. Observe unauthorized access

Impact: Attacker could bypass authentication and access any account.

Proof of Concept: [Screenshot or video attached]

Suggested Fix: Use prepared statements for database queries.

Reporter: Your Name (email@example.com)

5. Severity Classification

Severity Description Response Time
Critical Remote code execution, authentication bypass, data breach
Impact: Complete system compromise
24 hours
High SQL injection, XSS (stored), privilege escalation
Impact: Significant security breach
7 days
Medium CSRF, information disclosure, XSS (reflected)
Impact: Limited security impact
30 days
Low Information leakage, best practice violations
Impact: Minimal security impact
90 days

6. What to Expect

6.1 Response Timeline

6.2 Communication

We will keep you informed throughout the process:

7. Recognition & Rewards

7.1 Hall of Fame

🏆 Security Researcher Recognition: We maintain a Hall of Fame page recognizing security researchers who have helped improve our security.

We will publicly acknowledge your contribution (if you wish) including:

7.2 Bug Bounty (Coming Soon)

We are developing a bug bounty program that will offer monetary rewards for qualified vulnerability reports:

Details will be announced when the program launches.

8. Legal Protection

8.1 Safe Harbor

⚖️ Legal Protection: We will not pursue legal action against security researchers who comply with this Responsible Disclosure Policy.

If you comply with this policy when reporting vulnerabilities:

8.2 Conditions

This protection applies only if you:

9. Coordinated Disclosure

9.1 Disclosure Timeline

We prefer coordinated disclosure:

  1. Report: You report the vulnerability to us privately
  2. Fix: We fix the vulnerability
  3. Coordinate: We work with you to agree on disclosure timing
  4. Disclose: We publicly disclose the fixed vulnerability

9.2 Our Disclosure Policy

9.3 If We Don't Fix It

If we cannot fix a vulnerability within a reasonable timeframe, we will:

10. Examples of Good Reports

10.1 SQL Injection Example

✅ Good Report:

"I discovered a SQL injection vulnerability in the transaction history page. The 'sort' parameter is not properly sanitized. By injecting SQL code, I was able to extract database schema information (attached screenshot showing table names). This could allow an attacker to extract sensitive data. Steps to reproduce and proof of concept are attached."

10.2 XSS Example

✅ Good Report:

"I found a stored XSS vulnerability in the referral code field. When a user enters a referral code containing JavaScript, it is stored without sanitization and executed when displayed on the referrals page. This could allow an attacker to steal session cookies. Video demonstrating the vulnerability is attached."

11. Questions?

11.1 Contact Us

📧 Security Team Contact:

For Vulnerability Reports:
Use the support system with subject: [SECURITY VULNERABILITY]

For General Security Questions:
Use the support system with subject: [SECURITY INQUIRY]

Response Time: 48 hours maximum

PGP Key: Available upon request for encrypted communication

11.2 Frequently Asked Questions

Q: Can I test on production?

A: Yes, but only create test accounts and do not access others' data or disrupt service.

Q: How long do I need to wait before public disclosure?

A: We prefer 90 days from report date, but we'll coordinate with you.

Q: Can I mention this in my resume/portfolio?

A: Yes, after we've patched and publicly disclosed the vulnerability.

Q: What if I accidentally accessed user data?

A: Inform us immediately, delete any accessed data, and do not proceed further.

Q: Do you accept reports from anonymous researchers?

A: Yes, but we cannot provide recognition or future bounties without contact info.

12. Thank You

🙏 Appreciation: We are grateful to the security community for helping us protect Cryptoffsize and our users. Your responsible research makes the internet safer.

Together, we can ensure Cryptoffsize remains secure for all users.

Help us build a more secure platform. Report responsibly.