← Home

Coordinated vulnerability disclosure

GrailGuard moves luxury goods, payments, and personal data. We take security seriously and welcome good-faith research from the community.

Quick report: email security@grailguard.io with a PoC and your contact details. We respond within 1 business day and update weekly until the report is closed. PGP key fingerprint published on this page and in our /.well-known/security.txt.

Scope

In-scope assets

Out of scope

Rewards

We do not offer paid bounties at this time, but we do offer recognition and GrailGuard credit. We will review paid bounty once we reach our next funding milestone.

SeverityWhat countsAcknowledgement
Critical Remote code execution, SQL injection on production DB, authentication bypass yielding admin access, reading other customers' payment methods or IDs Hall of Fame + $500 GrailGuard credit (or charitable donation in your name)
High IDOR exposing another customer's bookings or recipients, stored XSS in authenticated dashboards, auth token theft, signed-webhook forgery Hall of Fame + $250 credit
Medium Reflected XSS in authenticated pages, CSRF on state-changing endpoints, rate-limit bypass on sensitive actions Hall of Fame + $100 credit
Low Information disclosure, edge-case timing attacks, insecure direct references without privilege escalation Hall of Fame listing

Safe harbour

If you follow the rules below, we will not pursue civil or criminal action against you for good-faith research, and we will work with you to defuse any third-party claim (ISP, hosting provider, Stripe, etc.) that may arise.

How to report

Send a report to security@grailguard.io. Please include:

Report a vulnerability

Hall of fame

Researchers who have responsibly disclosed vulnerabilities to us. We add new entries with researcher consent.

Last updated: 2026-04-20.