Report a Vulnerability


 

Aliapex – Report a Vulnerability

Effective Date: [Insert Date]


1. Overview

Aliapex takes security seriously. If you discover a security vulnerability, we encourage you to report it responsibly so we can investigate and fix it quickly.


2. What to Report

You should report any issue that could compromise the security or integrity of Aliapex, including:

  • Account takeover vulnerabilities

  • Payment or transaction manipulation

  • Data exposure or unauthorized access

  • API or authentication weaknesses

  • Cross-site scripting (XSS), SQL injection, or similar flaws

  • Any issue that could impact users, data, or platform security


3. How to Report

Please send your report to:
📧 security@aliapex.com

Include as much detail as possible:

  • Description of the vulnerability

  • Steps to reproduce the issue

  • Proof of concept (screenshots, videos, or code)

  • Potential impact

  • Your contact information


4. Responsible Disclosure Guidelines

We ask that you:

  • Act in good faith and avoid violating user privacy

  • Do not exploit the vulnerability beyond what is necessary to demonstrate it

  • Do not access, modify, or delete other users’ data

  • Do not disrupt services (e.g., no DDoS or spam attacks)

  • Keep the vulnerability confidential until it is resolved


5. Our Commitment

When you report a valid vulnerability, Aliapex will:

  • Acknowledge receipt of your report

  • Investigate and validate the issue

  • Work to fix it as quickly as possible

  • Keep you informed of progress (where appropriate)


6. Safe Harbor

Aliapex will not take legal action against researchers who:

  • Comply with this policy

  • Act in good faith

  • Do not exploit vulnerabilities for personal gain


7. Rewards (Optional)

Aliapex may, at its discretion, offer:

  • Recognition

  • Bug bounty rewards (if applicable program is active)


8. Scope

This policy applies to:

  • Aliapex website and applications

  • APIs and infrastructure owned or operated by Aliapex

Third-party services may have separate policies.


9. Exclusions

The following are generally not considered vulnerabilities:

  • Spam or social engineering attacks

  • Issues requiring physical access to a device

  • Outdated browser-related issues without clear exploit

  • Low-impact issues with no realistic security risk


10. Contact

For all security-related concerns:
📧 security@aliapex.com


We appreciate your help in keeping Aliapex secure for everyone.


This is a standard cookie notice which you can easily adapt or disable as you like in the admin. We use cookies to ensure that we give you the best experience on our website.