Vulnerability Disclosure Program

Last Updated: 10-11-25

At POSEBEN TECHNOLOGIES LLP (“Company”, “Gamalogic”, “we”, “our”, or “us”), we prioritise security and value the efforts of the security research community in identifying and responsibly disclosing vulnerabilities.

This Vulnerability Disclosure Policy should be read in conjunction with the Gamalogic Terms of Use.

1. Reporting Security Vulnerabilities

If you discover a security vulnerability in any Gamalogic product or service, including but not limited to the dashboard, API, or browser extensions, we encourage you to report it to us as soon as possible.

Please do not publicly disclose the vulnerability until it has been investigated, resolved, and verified by Gamalogic.

While we appreciate responsible disclosures, no monetary compensation or rewards are offered.

2. Safe Harbor

Gamalogic will not initiate legal action or report you to law enforcement provided that:

  • You report the vulnerability responsibly and in good faith
  • You comply with this disclosure policy
  • You avoid privacy violations, data destruction, or service disruption

3. Disclosure Guidelines

When submitting a vulnerability report, you must:

  • Notify Gamalogic with full details of the vulnerability
  • Provide clear steps to reproduce the issue
  • Include affected product, version, URLs, requests, responses, or screenshots where relevant
  • Allow reasonable time for remediation before any public disclosure
  • Avoid accessing private user data or modifying or deleting data
  • Avoid using automated scanning tools unless the issue is manually verified
  • Refrain from phishing, social engineering, or contacting Gamalogic users or employees

4. In Scope Vulnerability Categories

We welcome reports related to the following vulnerability types:

  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Authentication Bypass
  • Insecure Direct Object References (IDOR)
  • Remote Code Execution
  • Sensitive Data Exposure

5. Out of Scope Vulnerability Categories

The following issues are considered out of scope and should not be tested:

  • Denial of Service (DoS) attacks
  • SSL or TLS configuration issues
  • Brute force attacks
  • User enumeration issues
  • Missing or misconfigured flags on non sensitive cookies
  • Logout CSRF
  • Issues limited to deprecated browsers or plugins
  • Clickjacking on non sensitive, unauthenticated pages
  • Vulnerabilities requiring unrealistic user actions or disabled security features

6. How to Submit a Report

If you believe you have identified a valid security vulnerability, please report it directly to us.

Send your report to: info@gamalogic.com

Only verified and critical vulnerabilities will be reviewed for remediation.

7. Contact Information

If you have questions regarding this policy, please contact us using the details below.

POSEBEN TECHNOLOGIES LLP
Attn: Privacy Officer
Email: info@gamalogic.com
Website: www.gamalogic.com
Address: 1st floor, CC 54, 2593-5,
Bose Nagar, Kadavanthra, Kochi,
Ernakulam, Kerala, 682020