Report Security Issue
At DAL’S INTERIORS LTD, safeguarding the security of our systems and protecting the privacy of our customers are our highest priorities. If you discover a security vulnerability related to our website or services, we encourage you to report it to us immediately. We carefully review all legitimate reports and work diligently to resolve issues as quickly as possible.
Fundamentals
To maintain a responsible and safe disclosure process, please follow these guidelines when reporting security issues to DAL’S INTERIORS LTD:
- Confidentiality: Please give us reasonable time to investigate and fix the vulnerability before publicly disclosing any details.
- Respect Privacy: Do not access or modify private accounts or data without explicit consent from the owner.
- Avoid Disruption: Act in good faith to avoid harm, privacy breaches, or service interruptions while investigating.
- No Exploitation: Do not exploit the vulnerability for any purpose, including accessing sensitive data or seeking additional flaws.
- Legal Compliance: Ensure your actions comply with all applicable laws and regulations.
In return, DAL’S INTERIORS LTD will not pursue legal action against individuals acting in good faith to responsibly report security concerns.
Bug Bounty Program
We value security researchers who responsibly help us improve our services. Monetary rewards (“bounties”) may be offered at our discretion based on the risk, impact, and quality of the report.
To qualify for a bounty, your report must:
- Follow the fundamentals outlined above.
- Identify a legitimate security or privacy risk in our systems or infrastructure. (Note: Not all bugs qualify as security issues.)
- Be submitted exclusively via our official security contact (see below). Please do not contact our employees directly.
- Disclose any unintended privacy breaches or disruptions caused during your research.
We prioritize and investigate all valid reports, with response times depending on volume.
We reserve the right to publish resolved vulnerability reports.
Bounty Reward Levels
Severity | Maximum Reward | Examples |
---|---|---|
Critical | £160 | Remote code execution, privilege escalation, financial theft, full account takeover. |
High | £80 | Authentication bypass, corporate data leaks, stored XSS, local file inclusion. |
Medium | £40 | Logic flaws affecting multiple users, insecure object references. |
Low | Discretionary | Issues affecting single users, open redirects, reflective XSS, minor information leaks. |
Reward amounts are at our sole discretion and may change over time.
Reporting Process
Please submit detailed reports including clear, reproducible steps to help us understand and address the issue promptly.
Contact:
📧 Email: support@dalsinteriors.com
📞 Phone: +44 7788 250758