Once we get your report, a member of our team will respond to you as soon as possible. The exact product version and environment you found the bug on.Our bounty program is designed for software developers and security researchers, so reports should be technically sound. A good bug report needs to contain enough key information so that we can reliably reproduce the bug ourselves. We recommend you encrypt your email - you can use our PGP key. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |