CardFi
← Security

Responsible Disclosure Policy

Security Vulnerability Reporting — CardFi Bug Bounty Programme

We genuinely appreciate security researchers who take the time to responsibly disclose vulnerabilities. If you've found a security issue in CardFi, please report it — we'll investigate promptly and recognise your contribution.

1. Our Commitment

CardFi is committed to keeping our platform and users safe. We welcome responsible disclosure from security researchers and will:

  • Acknowledge your report within 48 hours
  • Provide regular updates on investigation progress
  • Work to resolve valid vulnerabilities within 30 days
  • Credit you publicly (if you wish) upon resolution
  • Not pursue legal action against researchers who act in good faith

2. Scope — In Scope

Primary Targets
  • cardfi.online — Main web platform
  • api.cardfi.online — API endpoints
  • CardFi mobile/PWA application

Vulnerability types we're particularly interested in:

  • Authentication bypass or account takeover
  • Authorisation flaws (accessing other users' data)
  • XSS (Cross-Site Scripting) with significant impact
  • SQL injection or database access
  • Sensitive data exposure (card numbers, KYC documents)
  • CSRF leading to account actions
  • Business logic flaws (e.g. bypassing deposit verification)
  • API security vulnerabilities

3. Out of Scope

  • Denial of Service (DoS/DDoS) attacks
  • Social engineering attacks against CardFi staff
  • Physical attacks against infrastructure
  • Vulnerabilities in third-party services not directly under our control
  • Issues requiring unlikely user interaction (e.g. self-XSS)
  • Rate limiting on non-sensitive endpoints
  • Missing security headers with no exploitable impact
  • Outdated software versions without proof of exploitability

4. Rules of Engagement

To qualify for responsible disclosure, you must:

  • Only test against accounts you own or have explicit permission to test
  • Not access, modify, or delete other users' data
  • Not perform automated scanning without prior written permission
  • Not publicly disclose the vulnerability before we've had 30 days to fix it
  • Not exploit the vulnerability beyond what is necessary to demonstrate it
  • Stop testing and report immediately if you encounter user data

5. What to Include in Your Report

A good vulnerability report includes:

  • Clear description of the vulnerability and its impact
  • Step-by-step reproduction instructions
  • Screenshots, video, or proof-of-concept code
  • Affected URL, endpoint, or component
  • Your assessment of severity (critical/high/medium/low)
  • Any suggested remediation (optional but appreciated)

6. Severity & Recognition

  • Critical (e.g. RCE, mass account takeover): Public credit + potential reward
  • High (e.g. auth bypass, data exposure): Public credit on our Hall of Fame
  • Medium/Low: Acknowledgement and thanks

We do not currently operate a formal paid bug bounty programme, but we recognise outstanding contributions and may offer rewards at our discretion for critical findings.

Report a Vulnerability

Send your security report to our dedicated security email. Please encrypt sensitive findings using our PGP key if available.

security@cardfi.online

© 2025 CardFi Technologies Inc. All Rights Reserved.