We take the security of our systems seriously, and we value the security of our users, contributors, clients, and customers. The disclosure of security vulnerabilities helps us ensure the security and privacy of our users. It is intended to give security researchers clear guidelines for conducting vulnerability discovery activities and to convey our preferences in how to submit discovered vulnerabilities to us.
Guidelines
Under this policy, “research” means activities in which you:
Confidentiality
Any information you find or collect about PIXLR GROUP or any PIXLR GROUP user through the security bugs must be kept confidential and only used in connection to us. Once you’ve established that a vulnerability exists or encounter any sensitive data (including personally identifiable information, financial information, or proprietary information or trade secrets of any party), you must stop your test, notify us immediately, and not disclose this data to anyone else.
Accessing the private information of other users, and performing actions that may negatively affect PIXLR GROUP users are strictly forbidden. You may not use, disclose or distribute any such confidential Information, including, but not limited to, any information regarding your submission and information you obtain when researching the PIXLR GROUP sites, without PIXLR GROUP prior written consent.
Test methods
In the interest of the safety of our users and staff, we'd like to ask you to refrain from:
If you follow these guidelines and immediately report to us, we commit to:
Reporting a vulnerability
We believe that all technology contains bugs and that the public plays a crucial role in identifying these bugs. If you believe you’ve found a security vulnerability in our system or platform please immediately send it to us by emailing Sylvester@designs.ai.
Please include the following details with your report:
Eligibility
We accept reports based on severity not less than 6 per CVSS 4. The final severity may be adjusted to reflect the impact of the reported vulnerability on our domains.
More on CVSS 4 scoring: https://www.first.org/cvss/calculator/4.0
In scope
Out of Scope
When reporting vulnerabilities, you shall consider the attack scenario/exploitability, and security impact of the bug. The following issues are considered out of scope from this Program, and we will not accept any of the following types of attacks:
Changes to Terms
PIXLR GROUP reserves the right to modify or cancel the program and its policies at any time, without prior notice.
Accordingly, PIXLR GROUP may amend these Terms and/or its policies at any time by posting a revised version on PIXLR GROUP's website. You accept the modified Terms if you continue to participate in the program after changes are made to the Terms.