Report a Vulnerability

No technology is perfect, and believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Disclosure Policy

  • Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.


While researching, we'd like to ask you to refrain from:

  • Denial of service
  • Spamming
  • Social engineering (including phishing) of staff or contractors
  • Any physical attempts against property or data centers

Safe Harbor

Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

Thank you for helping keep and our users safe!

Report a Vulnerability

Please submit a detailed description of the vulnerability to -

Please include the following:

  • Summary - Full description of the vulnerability being reported including the exploitability and impact.
  • Steps - Document all steps required to reproduce the exploit of the vulnerability
  • Supporting Material/References - URL(s)/application(s) affected in the submission (even if a code snippet ideo was also provided). IPs that were used while testing. The user account (if any) used for the Proof of Concept (PoC). Include all files that were attempted to upload. Provide the complete PoC with the submission (e.g., a Remote Code Execution that does not change files, upload only "hello world" test files, etc.) Save and attach all logs to the submission.