Email: hello@impactmojo.in
Please do NOT open a public issue for security vulnerabilities.
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Acknowledgement: Within 48 hours
- Resolution: Within 7 days for critical issues
In scope: XSS, data injection, credential exposure, content manipulation. Out of scope: DDoS, social engineering, third-party service vulnerabilities.