Return home icon

SyraxOps – Vulnerability Disclosure & Acceptable Use Policy

Last updated: 12 December 2025

Purpose

At SyraxOps, security is a core priority. This policy defines clear boundaries for reporting security issues while explicitly stating that no active security testing or scanning is authorized against SyraxOps systems.

SyraxOps does not invite, permit, or consent to vulnerability scanning, probing, enumeration, or testing of any kind. This policy exists solely to provide a responsible channel for reporting accidentally discovered security issues.


πŸ“ Scope

This policy covers syraxops.com and any subdomains operated directly by SyraxOps.

Third-party services (including Cloudflare infrastructure we do not control), embedded content, analytics platforms, hosting providers, or any external systems are out of scope unless explicitly stated in writing.


πŸ“¬ How to Report a Vulnerability

Please send reports to contact@syraxops.com.

Include the following whenever possible:


πŸ›‘οΈ Reporting Rules


❌ Prohibited Actions

Security & Abuse

Intellectual Property & Content Use

Public accessibility or obfuscation does not imply permission to copy or derive works from site assets.


πŸŽ‰ Recognition

At our discretion, responsible reporters may be acknowledged on a future Hall of Fame page if they request it.


πŸ’° No Bug Bounty

SyraxOps does not operate a paid bug bounty program. Submitting a vulnerability report does not guarantee monetary compensation.


🀝 Our Position


βš– Governing Law

This policy is governed by the laws of Australia. Disputes fall under the applicable local jurisdiction.