We take security seriously. If you discover a vulnerability in our platform, we want to hear from you — and we reward responsible disclosure generously.
Submit a ReportRewards are determined based on the CVSS score and real-world impact of the vulnerability. Amounts listed are in Indian Rupees (INR).
Only reports against the assets listed below are eligible for rewards.
Follow these steps to submit a vulnerability report and maximize your chances of a valid reward.
Verify the vulnerability is reproducible and document exact steps to trigger it.
Consider what data or systems could be accessed, modified, or disrupted.
Include a clear title, description, reproduction steps, CVSS score estimate, and PoC.
Send your report to security@a-log.in with the subject 'Bug Bounty Report'.
Subject: Bug Bounty Report — [Brief Title] **Vulnerability Type:** (e.g., SQL Injection, XSS, IDOR) **Severity Estimate:** Critical / High / Medium / Low **CVSS Score (optional):** X.X **Description:** [Explain the vulnerability clearly] **Steps to Reproduce:** 1. ... 2. ... 3. ... **Impact:** [Describe what an attacker could achieve] **Proof of Concept:** [Screenshots, curl commands, or code snippets] **Suggested Fix (optional):** [Your recommendation]
By participating in this program you agree to the following responsible disclosure guidelines.
Do not publicly disclose the vulnerability until it has been resolved and you have received written authorization from us.
Only access data necessary to prove the vulnerability. Do not modify, delete, or exfiltrate user data beyond a minimal PoC.
Do not use automated scanners against production infrastructure without prior written approval.
Do not engage in any activity that could harm users, disrupt services, or violate applicable laws.
Submit one report per unique vulnerability. Duplicate reports will credit the first reporter.
You may not test on behalf of another researcher or organization without explicit consent from both parties.
APIs.a-log.in will not pursue legal action against security researchers who discover and report vulnerabilities in good faith and in accordance with this policy. We consider security research conducted under this program to be authorized. We will work with you to understand and resolve issues quickly. We appreciate your help in keeping our platform secure and will recognize your contribution publicly (with your permission) in our Hall of Fame.
We gratefully acknowledge the researchers who have helped improve our security.
No reports yet. Discover a vulnerability and your name could be the first listed here.
Submit a Report