contact://support
form://submit
security://disclosure
Security Disclosure
When reporting a vulnerability, include enough context for fast triage.
- 1. Exact reproduction steps and affected route/endpoint.
- 2. Expected behavior vs observed behavior.
- 3. Impact level and potential abuse path.
- 4. Relevant logs, timestamps, and environment details.
- 5. Screenshots or request/response samples if available.