Guidelines for Responsible Disclosure

To ensure a smooth and cooperative disclosure process, please adhere to the following guidelines:

  • Responsible Research
    Kindly conduct your research in an ethical and non-disruptive manner. Do not attempt to access, modify, or share data without permission.

  • Do Not Share Publicly
    Please do not disclose the vulnerability publicly until we have had a chance to investigate and address it.

  • Provide Sufficient Information
    In your report, include all relevant information to help us understand the issue, including details about the environment, potential impact, and any steps to reproduce the vulnerability.

  • Maintain Confidentiality
    Respect the confidentiality of our users' data and any proprietary information you may access during your research.

  • No Financial Compensation At the Moment
    iSmartRecruit currently does not offer monetary rewards or bounties for vulnerability reports.

Our Commitment

iSmartRecruit is committed to addressing and resolving security vulnerabilities promptly. We will make every effort to:

  • Acknowledge your report within 24 hours of receipt.

  • Provide regular updates on the status of the vulnerability.

  • Notify you when the issue is resolved and, if applicable.

Legal Disclaimer

iSmartRecruit reserves the right to update or modify this Vulnerability Disclosure Program at anytime. This program does not grant any permission or license to access, modify, or otherwise interfere with iSmartRecruit's software, systems, or data.

By participating in this program, you agree to comply with all the terms and guidelines outlined on this page.

Thank you for helping us improve the security of iSmartRecruit. Your efforts are crucial in maintaining a safe and secure experience for our users.

Contact us to report a vulnerability

You can submit the following information on [email protected].

  • Full Name
  • Email
  • Title (A clear title includes the type of vulnerability and the impacted asset.)
  • Description (What is the vulnerability? In clear steps, how do you reproduce it?)
  • Impact (What security impact could an attacker achieve?)

Let's grow together

Demos are a great, fast way to learn about iSmartRecruit.
Connect with us now to learn more!

30 minutes to explore the software.