SafePassVpn

SafePassVPN

All systems operational
Responsible Disclosure

Found a security issue? Tell us.

We welcome reports from security researchers and users. If you've discovered a vulnerability, please report it responsibly — we'll take it seriously, respond quickly, and publicly credit you for your help.

security@safepassvpn.com

Safe Harbor

If you discover and report a vulnerability in good faith — following the guidelines below — SafePassVPN will not pursue legal action against you. We consider responsible security research to be a valuable service and will not treat it as unauthorized access.

How to report

1

Find a potential vulnerability

Test only against your own account. Do not access, modify, or delete other users' data.

2

Email us at security@safepassvpn.com

Include a clear description, steps to reproduce, and the potential impact. Screenshots or screen recordings help.

3

We respond within 48 hours

We'll confirm receipt, assess the report, and keep you updated throughout the fix process.

4

We fix and credit you

Once resolved, we'll publicly credit you as a security contributor on this page — unless you prefer to stay anonymous.

Scope

In scope

Authentication or authorization flaws in our app or API
Data leakage or exposure of user information
Server-side code execution or injection vulnerabilities
Privilege escalation or unauthorized access
VPN traffic interception or tunnel bypass
Sensitive data transmitted without encryption

Out of scope

Denial of service (DoS/DDoS) attacks
Social engineering or phishing of SafePassVPN staff
Physical attacks against our infrastructure
Vulnerabilities in third-party services we use
Issues requiring unlikely user configurations
Missing security headers without demonstrable impact

Rewards

SafePassVPN is an early-stage independent project. We don't currently offer monetary bounties. What we do offer: public credit on this page, a sincere thank-you, and the knowledge that you've helped protect the privacy of thousands of real users. We plan to introduce monetary rewards as the product grows.

What to include in your report

Description

A clear explanation of the vulnerability and what it allows an attacker to do.

Steps to reproduce

Exact steps, commands, or requests that trigger the issue.

Impact

Who is affected and what data or systems could be compromised.

Evidence

Screenshots, screen recordings, or proof-of-concept code if possible.

Your contact

How we can reach you with updates. Anonymous reports are accepted.

Security contributors

No reports yet — be the first. We'll credit researchers here once vulnerabilities are reported and resolved.