Report Security Issues

If you’ve found a security vulnerability on pedod.com, we encourage you to contact us immediately. We review all legitimate reports and aim to resolve issues quickly. Before reporting, please review this document — including our fundamentals, bounty program, reward guidelines, and non-reportable issues.

Fundamentals

If you follow the principles below when reporting a security issue to pedod.com, we will not initiate legal action or enforcement investigations against you in response to your report.

We ask that:

  • You give us reasonable time to review and fix the issue before disclosing it publicly or sharing it with others.

  • You do not interact with or access private accounts without the account owner's consent.

  • You make a good-faith effort to avoid privacy violations, service disruptions, or data destruction.

  • You do not exploit the issue for any reason, including to demonstrate further risks or access sensitive data.

  • You comply with all applicable laws and regulations.

Bounty Program

We recognize and reward security researchers who help protect our platform by reporting vulnerabilities. Bounties are awarded at PEDOD LLC’s discretion, based on risk, impact, and report quality.

To potentially qualify for a bounty, you must:

  • Follow the fundamentals listed above.

  • Report a valid security bug that poses a risk to privacy or security.

  • Submit your report through our official contact channels — please do not contact employees directly.

  • Disclose any accidental privacy violations or disruptions in your report.

  • Understand that while we investigate all valid reports, priority is based on risk. A response may take some time.

  • Agree that we reserve the right to publish submitted reports.

Rewards

Rewards are based on the impact and severity of the vulnerability. Please provide detailed and reproducible steps in your report. If the issue cannot be reproduced, it is not eligible for a bounty.

  • The first valid report of an issue receives the bounty.

  • Multiple bugs caused by a single underlying issue are treated as one report.

  • We assess rewards based on impact, exploitability, and report quality.

Maximum Reward Amounts by Severity:

  • Critical Severity – $200: (e.g., Remote Code Execution, Vertical Authentication Bypass, SQL Injection).

  • High Severity – $100: (e.g., Lateral authentication bypass, Stored XSS, Local file inclusion).

  • Medium Severity – $50: (e.g., Logic or business process flaws).

  • Low Severity – Recognition Only: (e.g., Open redirects, Reflected XSS).


Contact Information

📍 Address: 231 Willow St, Nashville, TN 37210, USA

✆ Phone: +1 (256) 680-1708

✉ Email: Contact@pedod.com