Security Policy - Summary

We reward cybersecurity researchers' responsible disclosures on a first-reported basis, only if they meet the strict eligibility criteria. Please read the full policy below.

Security Policy - Full

This Security Policy covers all of our websites and web applications. This website is operated by its developer ("we" or "us").

Introduction

Security is core to our values, and we value the input of hackers acting in good faith to help us maintain a high standard for the security and privacy of our users. This includes encouraging responsible vulnerability research and disclosure. This policy sets out our definition of good faith in the context of finding and reporting vulnerabilities, as well as what you can expect from us in return.

Scope: Eligible Cybersecurity Research Submissions

Only the following submissions are eligible for a reward:

Out-of-Scope: Submissions Not Eligible for a Reward

Anything not explicitly identified in the Eligibility section is ineligible. The following are explicitly prohibited:

Ground Rules

To encourage vulnerability research and avoid confusion between legitimate research and malicious attacks, we ask that you attempt, in good faith, to:

Safe Harbor

When conducting vulnerability research according to this policy, we consider this research to be:

You are expected to comply with all applicable laws. If legal action is initiated by a third party against you and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

If you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through our Official Channels before proceeding further.

Other Conditions

All cybersecurity researchers are eligible for a reward, subject to the following conditions:

How to Claim Your Bug Bounty

Submit your report via email to security@ztzt.dev, including:

Upon verification, we will reply within two weeks. Complex attacks may require longer. Please do not make public disclosures without prior written permission.

Changes

This Security Policy may be updated periodically. Please check back regularly for changes.

Last updated: 22 June 2025