If you have discovered a vulnerability or bug, we kindly request that you follow these steps:

  1. Create a detailed report outlining the vulnerability you have identified.
  2. Include any relevant information such as the steps to reproduce the issue, system configurations, and any supporting materials like screenshots or videos.
  3. Send your report via email to our team at .