- send your finding to security@pinkelephant.nl
- not exploit the problem by, for example, downloading more data than necessary to exploit the leak to, ou view, delete and modify third-party data,
- not to share the problem with others until it is resolved and to delete all confidential data obtained through the leak immediately after the leak is closed;
- no use is made of the use of false advertising, social engineering, distributed denial of service, spam or applications of the Services;
- provide sufficient information to reproduce the problem so that we can resolve it as quickly as possible. Usually, the IP address or URL of the system used and a description of the network configuration is sufficient, but more information may be required for more complex network configurations.