At Sendrella, we are deeply committed to maintaining the security and privacy of our platform and users. We understand the importance of cybersecurity and value the efforts of security researchers who help keep our systems secure.

We have established this Responsible Disclosure Program to provide guidelines for researchers to report security vulnerabilities responsibly.


Program Overview

We invite ethical hackers, penetration testers, and security researchers to test authorized systems for potential vulnerabilities. However, testing must be conducted within defined boundaries to avoid legal risks.

This program allows testing only on approved environments and outlines the rewards, legal protections, and expectations for responsible disclosure.


Scope of Testing

The following table outlines which systems are eligible for testing under this program:

Domain Status Description
https://staging.sendrella.com In-Scope Dedicated staging environment for testing. Resettable anytime.
https://swagger.sendrella.com In-Scope API documentation portal. Switch all API domains to staging.
https://sendrella.com Out-of-Scope Production environment. Strictly prohibited for testing.
Any other subdomain Out-of-Scope Not authorized for testing unless explicitly stated.

Important Note for API Testing:
The APIs listed on swagger.sendrella.com may reference production endpoints (sendrella.com). Before executing any API requests, replace the base domain with staging.sendrella.com to stay within scope.


Out-of-Scope Activities

To ensure the safety and availability of our services, the following testing methods and actions are prohibited:

Not Allowed Description
Denial of Service (DoS) Any action that disrupts or degrades system performance.
Spam or Brute Force Attacks Automated requests, login attempts, or flooding services.
Accessing or Modifying User Data Extracting, viewing, or altering data of real users.
Social Engineering & Phishing Attempting to deceive Sendrella employees or users.
Physical Security Testing Attempting to access physical infrastructure or offices.
Public Disclosure Before Remediation Sharing vulnerabilities publicly without written permission.

Any breach of these restrictions may result in legal consequences and removal from this program.


Accepted Vulnerabilities

We are interested in vulnerabilities that impact confidentiality, integrity, or availability of our services. Submissions related to the following categories are encouraged:

Category Examples
Authentication & Authorization Flaws Broken access control, privilege escalation, IDOR.
Injection Attacks SQL Injection (SQLi), Command Injection, NoSQL Injection.
Cross-Site Scripting (XSS) Stored XSS, Reflected XSS, DOM-based XSS.
Cross-Site Request Forgery (CSRF) CSRF on sensitive actions.
Server-Side Request Forgery (SSRF) Unauthorized server-side requests triggered by user input.
Security Misconfiguration Exposed admin panels, default credentials, verbose error messages.
Cryptographic Issues Weak encryption, improper key management, broken SSL/TLS configs.
API Security Issues Unauthenticated access, excessive data exposure, rate-limit bypass.
Vulnerable Components Use of outdated software or known vulnerable libraries.
Other Logical or Business Flaws Issues affecting platform integrity or process bypasses.

We prioritize submissions that follow OWASP Top 10 security risks.


Rewards & Recognition

We appreciate your contribution and offer rewards based on the impact of your findings.

Severity (CVSS v3.1 Score) Reward
High (Above 7.0) 50,000 Sendrella Credits, Hall of Fame listing, Certificate of Appreciation.
Medium (4.0 – 7.0) Hall of Fame mention, exclusive Sendrella swag (subject to availability).
Low (Below 4.0) Recognition (at our discretion).

All reports are reviewed and validated internally.
Rewards are subject to severity assessment and availability.


We respect the work of ethical hackers and security researchers. If you:

  • Follow this program’s guidelines.
  • Act in good faith.
  • Test only within the defined scope.

You are exempt from legal action by Sendrella.

However, actions such as testing outside the scope, malicious behavior, or unauthorized disclosure will void this protection and may lead to legal consequences.


How to Submit a Report

Email your findings to: [email protected]

Your report should include:

  1. A clear description of the issue.
  2. Step-by-step instructions to reproduce the vulnerability.
  3. Screenshots, proof-of-concept code, or logs (if applicable).
  4. Suggested CVSS score (optional; we will validate internally).

Response Process

Action Timeline
Acknowledgement Within 5 business days.
Assessment & Review Depending on complexity, we’ll keep you updated.
Remediation Timeline will vary based on severity and complexity.
Reward Notification After resolution, rewards will be processed (if applicable).

Hall of fame

No. Name Profile No. of accepted vulnerabilities

Our Commitment to Security

Thank you for helping us improve the security of Sendrella.
Your contribution makes the platform safer for everyone!