Vulnerability Disclosure Policy

// The Rules of Engagement

So, you think you found a bug? Good. That's literally what this page is for. We built a platform called hack.adityasec.com — the name isn't subtle, and neither are we.

We believe security researchers are the unsung heroes of the internet. You find what automated scanners miss, you think like attackers so defenders don't have to, and you make the digital world a little less broken. We appreciate you.

Found something? Report it. We won't sue you — we'll send you cool swags instead.

Scope

Yes, the domain name is literally telling you to hack it. But let's be specific:

AssetTypeSeverity
hack.adityasec.comWeb ApplicationCriticalInfo
API endpoints (hack.adityasec.com)REST APICriticalInfo

Everything else — adityasec.com, mailer.adityasec.com, your neighbor's WiFi — is out of scope. Stay in your lane.

In-Scope Vulnerabilities

The juicy stuff we actually care about:

Out of Scope

Please don't waste your time (or ours) on these:

Safe Harbor

This part is serious. We will not take legal action against security researchers who:

  • Make a good faith effort to avoid privacy violations, data destruction, or service disruption
  • Do not access or modify data belonging to other users
  • Report vulnerabilities promptly and provide sufficient detail for remediation
  • Do not publicly disclose the vulnerability before we've had reasonable time to fix it

TL;DR: Hack responsibly, report honestly, and we'll treat you with respect. That's a promise.

Testing Guidelines

We strongly encourage manual testing over automated scanner dumps. Anyone can run Nuclei and paste the output — that's not security research, that's copy-paste. Take the time to understand the application, craft meaningful payloads, and demonstrate real impact.

Show us you actually understand the vulnerability. A well-written report with clear reproduction steps will always be valued over a 47-page automated scan report that nobody reads.

Need authenticated access for deeper testing? We've got you covered:

Rewards

Let's be upfront: this is not a bug bounty program. We're not throwing cash at every finding. But we do appreciate valid security reports, and researchers who submit impactful, well-documented findings will receive cool swags as a token of our gratitude.

What counts as "cool swags"? That's for us to know and you to find out. Submit a valid report and see for yourself. 😎

Rate Limits

OTP send: 10 per 5 min per IP (60s cooldown between sends). OTP verify: 10 per min. Report submission: 5 per 5 min. Codes valid for 5 minutes. Email changes: 2 max per session. Please be patient — the rate limits exist for a reason.

// Submit a Report

Found something interesting? Drop the details below. Be specific, be thorough, and show us the impact.

🎉
Report Submitted Successfully!
Thank you for helping us improve our security. We'll review your report and get back to you via email.
Expect cool swags if the report is valid! 😎

// Request Testing Credentials