What Should Be Reported?
Vulnerabilities
- Broken authentication or authorization
- XSS, SQL injection, CSRF risks
- Exposed sensitive data
Suspicious Activities
- Phishing attempts
- Unauthorized access
- Unusual network traffic
Please report any security vulnerabilities or suspicious activities immediately