- send your finding to security@pinkelephant.nl
- not exploit the problem by, for example, downloading more data than necessary to demonstrate the leak, or viewing, deleting or modifying third-party data,
- not to share the problem with others until it is resolved and to delete all confidential data obtained through the leak immediately after the leak is closed;
- not use physical security attacks, social engineering, distributed denial of service, spam or third-party applications;
- provide sufficient information to reproduce the problem so that we can resolve it as soon as possible. Usually, the IP address or URL of the affected system and a description of the vulnerability is sufficient, but more may be required for more complex vulnerabilities.