FUR4

Security Policy

FUR4 Responsible Disclosure & Bug Bounty Program

Security is a top priority at FUR4.
We appreciate the efforts of the security community in helping us maintain the safety and trust of our platform. If you’ve discovered a vulnerability in our systems, we want to hear from you.

This program is designed to recognize security researchers who responsibly disclose vulnerabilities that could affect the privacy, integrity, or availability of our systems or users.



Program Overview

We accept responsible disclosure of legitimate, exploitable security vulnerabilities that materially impact the security, privacy, or financial integrity of our systems.

This program is not intended for automated scans, speculative findings, best-practice suggestions, or low-effort reports.
Submissions that do not demonstrate real-world exploitability and impact will be rejected without response.



Eligibility Requirements (Read Carefully)

To be eligible for a bounty, all of the following must be true:
• You are 18 years of age or older
• You are not:
• A current or former employee
• A contractor, subcontractor, or vendor
• An affiliate, partner, advisor, or consultant
• Employed by or affiliated with any company that has provided development, security, QA, DevOps, or infrastructure services to us
• You are not acting on behalf of any affiliated individual or company
• You can legally participate in a bug bounty program under all applicable laws

Any submission that violates these eligibility requirements is automatically disqualified.



Scope

In-Scope
• Production web applications and APIs owned and operated by us
• Authentication and authorization mechanisms
• Account access controls
• Payment, checkout, and order flows
• User data exposure and privacy controls

Out-of-Scope
• Denial-of-Service (DoS/DDoS) or traffic flooding
• Social engineering, phishing, or pretexting
• Physical security attacks
• Third-party systems and dependencies (including but not limited to AWS, Stripe, Twilio, Deel)
• Missing security headers or best-practice-only findings
• Self-XSS or clickjacking without sensitive impact
• Issues requiring unrealistic or impractical user interaction
• Rate-limiting observations without demonstrated exploitation



Reporting Requirements

Valid reports must include:
• Clear description of the vulnerability
• Exact, reproducible steps to exploit
• Proof of exploitability and real-world impact
• Supporting evidence (screenshots, logs, or proof-of-concept)

We will reject reports that are:
• Automated scan output
• Duplicate reports
• Vague, speculative, or theoretical
• Previously known, already reported, or already mitigated

Prohibited Actions

Do not:
• Access or modify data beyond what is strictly necessary to demonstrate impact
• Attempt lateral movement or persistence
• Disrupt production services
• Publicly disclose vulnerabilities before remediation is complete and authorized



Duplicate Reporting & First-Reporter Rule
• Bounties are awarded only to the first eligible reporter who submits a valid, complete, and reproducible report for a given vulnerability.
• Duplicate reports receive no bounty, regardless of quality or detail.
• Timestamp of receipt determines priority.
• We do not split or share rewards between multiple reporters.



Severity Levels & Rewards

Bounties are awarded at our sole discretion, based on actual impact, exploitability, and scope.

🔴 Critical — $300–$500

Examples:
• Authentication bypass
• Account takeover
• Unauthorized access to sensitive user data
• Payment, order, or pricing manipulation

🟠 High — $150–$300

Examples:
• Privilege escalation
• IDOR with sensitive data exposure
• Stored XSS with real impact
• Business logic flaws causing financial or data risk

🟡 Medium — $50–$150

Examples:
• Reflected XSS with demonstrated impact
• CSRF on sensitive actions
• Limited-scope data exposure

🟢 Low — $10–$50

Examples:
• Minor information disclosure
• Low-impact misconfigurations
• Edge-case validation issues

🔵 Informational — No bounty

Examples:
• Best-practice suggestions
• Theoretical or non-exploitable findings
• Missing headers without demonstrated impact



Payment Terms & Compliance (Non-Negotiable)
• All bounties are paid exclusively via Deel.com
• Net 30 payment terms from the date the issue is validated and accepted
• Identity verification and tax compliance via Deel are required

We do not pay via:
• Cryptocurrency
• PayPal, Wise, Venmo
• Direct bank transfer
• Gift cards

Failure or refusal to complete Deel onboarding voids the bounty.



Legal Safe Harbor

If you:
• Follow this policy
• Act in good faith
• Avoid privacy violations and service disruption

We will not pursue legal action related to your research.

Safe harbor does not apply to:
• Data theft
• Extortion or ransom demands
• Service disruption
• Public disclosure without explicit authorization



Program Discretion

We reserve the right to:
• Determine severity, eligibility, and payout amount
• Reject any submission at our sole discretion
• Decline reports that create legal, operational, or reputational risk
• Modify or terminate this program at any time without notice



Submission Process

Send reports to: [email protected] 

Subject:
Bug Bounty Submission – [Concise Title]