Ensuring Your Safety Online

At Pashtya, we ensure that our website is safe and secure. We use advanced encryption, conduct regular security audits, and employ multi-layered authentication for a safe online experience. Trust us for secure transactions and transparent communication about our practices.

Please submit security issues to:

Security-reporting@Pashtya.com

Only security-related submissions will be considered. If you wish to encrypt your submission please use the following PGP key. If you require site-related support please visit the support page

Avoid Engaging in any Harmful Actions

Examples include denial of service, unauthorized data access or modification, malware distribution, and any actions violating our platform's terms.

Guidelines

We really appreciate when people find and tell us about problems that can make our website unsafe. For a safe and secure platform, follow our guidelines and let us know if you encounter any issues.

  • Quick Reporting:

    Report issues to Pashtya immediately via our designated email.

  • Exclusive Reporting:

    Do not share the issue on other platforms or forums.

  • Domain Limit:

    Issue must be on a Pashtya-owned domain e.g Pashtya.com

  • Verifiability:

    Our security team must be able to verify the issue.

For Your Report, Please Include:

  • Proof of Concept:

    A demonstration showing the issue and how it can be exploited.

  • Reproduction Steps:

    Detailed instructions to recreate the issue.

  • Contact Details:

    Your email for follow-up discussions.

Acknowledgment

For discovering and responsibly disclosing critical security flaws or zero-day exploits, security researchers may be recognized in the following ways:

  • Public Recognition:

    The researcher's name or company of choice may be published in the Security Hall of Fame, showcasing their contributions to enhancing cybersecurity.

  • Special White Hat Badge:

    The researcher's Pashtya.com account will be awarded a special White Hat badge, symbolizing their expertise and commitment to ethical hacking practices.

Title

Text