Last update: 10 DECEMBER 2024
This policy outlines the procedures for reporting and addressing security vulnerabilities related to Coda Payments. Security researchers who interact with Coda Payments’ products and services are encouraged to report any potential or identified vulnerabilities in our system by sending us an email following the template given below.
We appreciate your effort in securing our systems. If you believe you have discovered a security vulnerability in our systems, you are strongly encouraged to adhere to the following actions:
Violation of any of the above actions will result in the void of rewards and rejection of all future reports.
To report a security vulnerability, please submit it only via this form Vulnerability Submission Form. Submission via all the other reporting channels will be ignored.
Please report ONE security vulnerability per submission.
Please ensure that all the information submitted in the form is correct as we will refer to it for follow-up.
After receiving the vulnerability report, we will follow a series of steps to validate the reported vulnerability:
If the reported vulnerability is a duplicate, we do not award the reporter.
4a) In scope
The below list of URLs is in scope for the bug bounty program:
4b) Out of scope
Authenticated tests are out of scope unless public sign-up is available.
Please note that URLs that are not in the above list, along with the URL(s) below, are excluded from the bug bounty program (this list shall not be exhaustive):
Please also note that we exclude these vulnerability categories from the bug bounty program (the list shall not be exhaustive):
These vulnerability categories are excluded from the bug bounty program specifically for www.codashop.com (the list shall not be exhaustive):
Security researchers must also demonstrate that the issues are exploitable and impact the system; submitting only the output from tools, such as TLS protocols/ciphers and port scanning, is insufficient.
We appreciate your efforts to disclose vulnerabilities to us responsibly and by submitting the report to us, you agree to be bound by the following terms and conditions:
We offer rewards to security researchers who responsibly disclose vulnerabilities that exist in in-scope systems and can demonstrate that the vulnerabilities are exploitable. The value is determined based on severity as follows:
We only support the Payoneer payment method. The above amount excludes fees that may be imposed by Payoneer.
Once we have determined the value of the rewards, the security researcher can agree or appeal to the amount (for 1 time). We will disclose the payment details once the security researcher agrees to the bounty reward.
All information in this policy is subject to change without notice. Please review this policy periodically for any updates.
© 2025 Coda Payments Pte. Ltd
Site Credits