Modyo customers with a support contract can report the vulnerability directly through the Modyo Support Center, issuing a security incident.
Otherwise, send an email to email@example.com.
What we need from you
Detail the steps you followed that make the vulnerability exploitable including any URLs or code you used. The more information you provide, the faster we can reproduce and fix the problem.
Please don’t send PDF, DOC, or EXE files or reports generated by DAST products. We do accept images.
- Cross-site scripting (XSS)
- SQL injection (SQLi)
- Cross-site request forgery (CSRF)
- Remote code execution (RCE)
- Cookies not used for authentication or CSRF protection, not being marked as Secure or HTTPOnly
- Data breaches, such as data of private sites or unauthorized admin access to Modyo.
How Modyo rewards you?
It’s in our plans, but we don’t have a bug bounty program currently. Instead, if you accept it, we’ll put you in our future Hall of Fame section of this guide under the name or nickname of your choice.
You need to get our permission before disclosing an issue publicly. We’ll only consider your public disclosure request after we’ve fixed the reported vulnerability.