- Main Web PlatformWeb applications accessible through douvery.com and its official subdomains.
- APIs and Backend ServicesAPI endpoints used by our platform to process transactions, authentication, and user data.
- Mobile ApplicationsOfficial Douvery mobile applications available in official stores.
- Payment InfrastructureSystems related to secure payment and transaction processing.
Responsible Disclosure Policy
At Douvery we value the security and privacy of our users. We appreciate the collaboration of security researchers and users who help us keep our platform secure through responsible disclosure of vulnerabilities.
Program Scope
The following areas are within the scope of our responsible disclosure program:
Research Guidelines
To participate in our responsible disclosure program, we ask you to follow these guidelines:
- No Unauthorized AccessDo not access, modify, or delete data that doesn't belong to you. Only use your own test accounts.
- User PrivacyRespect the privacy of our users. Do not access, copy, or disclose personal data of other users.
- Do Not Disrupt ServicesAvoid performing tests that could degrade or disrupt our services (DoS attacks, mass spam, etc.).
- Responsible DisclosureReport vulnerabilities directly to us before disclosing them publicly. Give us reasonable time to fix them.
- Detailed DocumentationProvide detailed information about the vulnerability including steps to reproduce, potential impact, and mitigation recommendations.
Out of Scope
The following types of vulnerabilities and behaviors are NOT covered by this policy:
- Social EngineeringPhishing, vishing, or any form of social engineering attacks against employees or users.
- Physical AttacksUnauthorized physical access to offices, data centers, or Douvery equipment.
- Third-Party ServicesVulnerabilities in third-party services or applications we don't directly control.
- Configuration IssuesDNS, SSL/TLS, security headers configurations without a demonstrable real impact.
- Known VulnerabilitiesVulnerabilities already reported by other researchers or being actively fixed.
Reporting Process
Follow these steps to report a security vulnerability:
- 1. Send Your ReportSend a detailed email to security@douvery.com with all relevant information about the vulnerability.
- 2. ConfirmationYou will receive a receipt confirmation within 48 business hours.
- 3. Initial AssessmentOur team will evaluate the vulnerability and respond with an initial assessment within 5 business days.
- 4. Progress UpdateWe will keep you informed about the progress of the fix and any additional information we need.
- 5. ResolutionOnce the vulnerability is fixed, we will notify you and coordinate public disclosure if appropriate.
Legal Protection (Safe Harbor)
We commit to the following guarantees for researchers acting in good faith:
- No Legal ActionWe will not initiate legal action against researchers who comply with this policy and act in good faith.
- Collaboration with AuthoritiesWe will not collaborate with authorities to prosecute researchers who follow these guidelines.
- Public RecognitionWith your consent, we may publicly acknowledge your contribution in our security Hall of Fame.
- Transparent CommunicationWe will maintain open and transparent communication throughout the disclosure process.
Frequently Asked Questions
Contact Information
To report security vulnerabilities, contact our security team:
Security Email: security@douvery.com
PGP Key: Available upon request for encrypted communications
