Security Program


GUIDELINES

GoAzam recognizes the importance of researchers who contribute to the security of our website. To encourage bug and vulnerability reports, we will commit to not bringing private action nor public inquiry against researchers who follow these guidelines such that the vulnerability:

  • Is reported to GoAzam via the above email as soon as possible
  • Is not published elsewhere
  • Exists on a domain owned by GoAzam (e.g. .GoAzam.com, GoAzam.co.)
  • Is verifiable by the security team

Please include the following information in your submission:

  • A proof-of-concept or demonstration of the vulnerability
  • Detailed instructions on how to reproduce the vulnerability
  • An e-mail address we can contact you at
RECOGNITION

Vulnerabilities that are deemed especially worthy by the security team may be rewarded in the following ways:

  • A name or company of the researcher's choosing published on the Security Hall Of Fame
  • A special White Hat badge (shown below) awarded to the researcher's GoAzam.com account
shield