Report Security Issues
If you have found a security vulnerability on BULULU, we encourage you to message us immediately. We will review all legitimate vulnerability reports and will do our utmost to quickly resolve the issue. Before you report, please review this document, including basic principle, bounty program, reward guidelines, and what should not be reported.
If you comply with the principles below when reporting a security issue to BULULU, we will not initiate a lawsuit or law enforcement investigation against you in response to your report. We ask that:
1.You give us reasonable time to review and repair an issue you report before making public any information about the report or sharing such information with others.
2.You don’t interact with an individual account (which includes modifying or accessing data from the account) if the account owner has not consented to such actions.
3.You make a good faith effort to avoid privacy violations and disruptions to others, including (but not limited to) destruction of data and interruption or degradation of our services.
4.You do not exploit a security issue you discover for any reason. (This includes demonstrating additional risk, such as attempted compromise of sensitive company data or probing for additional issues.)
5.You do not violate any other applicable laws or regulations.
We recognize and reward security researchers who help us keep people safe by reporting vulnerabilities in our services. Monetary bounties for such reports are entirely at BULULU’s discretion, based on risk, impact, and other factors. To potentially qualify for a bounty, you first need to meet the following requirements:
1.Adhere to our Basic Principle (see above).
2.Report a security bug: that is, identify a vulnerability in our services or infrastructure which creates a security or privacy risk. (Note that Rosegal ultimately determines the risk of an issue, and that many bugs are not security issues.)
3.Submit your report via our “email@example.com” email and respond to the report with any updates. Please do not contact employees directly or through other channels about a report.
4.If you inadvertently cause a privacy violation or disruption (such as accessing account data, service configurations, or other confidential information) while investigating an issue, be sure to disclose this in your report.
5.We investigate and respond to all valid reports. Due to the volume of reports we receive, though, we prioritize evaluations based on risk and other factors, and it may take some time before you receive a reply.
6.We reserve the right to publish reports.