SECURITY POLICY

███████╗███████╗ ██████╗██╗   ██╗██████╗ ██╗████████╗██╗   ██╗    ██████╗  ██████╗ ██╗     ██╗ ██████╗██╗   ██╗
██╔════╝██╔════╝██╔════╝██║   ██║██╔══██╗██║╚══██╔══╝╚██╗ ██╔╝    ██╔══██╗██╔═══██╗██║     ██║██╔════╝╚██╗ ██╔╝
███████╗█████╗  ██║     ██║   ██║██████╔╝██║   ██║    ╚████╔╝     ██████╔╝██║   ██║██║     ██║██║      ╚████╔╝ 
╚════██║██╔══╝  ██║     ██║   ██║██╔══██╗██║   ██║     ╚██╔╝      ██╔═══╝ ██║   ██║██║     ██║██║       ╚██╔╝  
███████║███████╗╚██████╗╚██████╔╝██║  ██║██║   ██║      ██║       ██║     ╚██████╔╝███████╗██║╚██████╗   ██║   
╚══════╝╚══════╝ ╚═════╝ ╚═════╝ ╚═╝  ╚═╝╚═╝   ╚═╝      ╚═╝       ╚═╝      ╚═════╝ ╚══════╝╚═╝ ╚═════╝   ╚═╝   
                                                                                                                  
                    PROTECTING OUR DIGITAL ASSETS WITH MAXIMUM TRANSPARENCY
VULNERABILITY REPORTING

If you discover a vulnerability in our systems, please report it immediately to mail@se4ko.com. We appreciate your help in keeping our systems secure and will work with you to address any issues responsibly.

RAPID RESPONSE
CONFIDENTIALITY
RECOGNITION
48H RESPONSE TIME
OUR COMMITMENT

We are committed to responding to security reports within 48 hours and will work actively to resolve all issues as quickly as possible. We believe in transparent communication and will keep you informed throughout the remediation process.

RESPONSE: < 48H
TRANSPARENCY: 100%
COMMUNICATION: ACTIVE
RESOLUTION: PRIORITY
RECOGNITION

We thank security researchers who help us improve our defenses. Visit our Hall of Fame to see the people who have contributed to our security posture and earned recognition for their responsible disclosure.

  • Public Recognition ACTIVE
  • Monetary Rewards AVAILABLE
  • Hall of Fame LIVE
SECURE COMMUNICATION

For secure communication, you can use our PGP key to encrypt sensitive vulnerability reports and ensure confidential disclosure.

PGP KEY: 0x5E4K-0C0D-3F1D-9A77
ENCRYPTION: AES-256
HASH: SHA-256
DOWNLOAD KEY
SECURITY SCOPE

This security policy covers:

  • SE4KO web applications and services COVERED
  • Public-facing infrastructure COVERED
  • Client-side security vulnerabilities COVERED
  • Authentication and authorization flaws COVERED
  • Data exposure and privacy issues COVERED
FOUND SOMETHING?

Help us maintain the highest security standards by reporting vulnerabilities responsibly.