Back to home
Security
We take security seriously. If you believe you've found a vulnerability in RewardZ Travel, please report it responsibly using the contact below. We commit to acknowledging your report within three business days.
Report a vulnerability
Email security@rewardztravel.com with as much detail as you can: affected URL, reproduction steps, impact, and any proof-of-concept. PGP not required.
Scope
In scope: anything served from www.rewardztravel.com and our public APIs (/api/*).
Out of scope:
- Third-party providers (Vercel, Supabase, Stripe, Anthropic, Google) — please report to them directly.
- Reports requiring physical access to a user's device.
- Social engineering or phishing of staff.
- Denial of service, traffic flooding, or rate-limit testing.
- Issues only reproducible on outdated browsers (more than two major versions behind).
- Missing security headers without a demonstrated impact.
Safe harbor
We won't pursue legal action against good-faith researchers who:
- Make a reasonable effort to avoid privacy violations and service disruption.
- Use only test accounts you own. Do not access, modify, or delete other users' data.
- Give us a reasonable window (at least 90 days, or until we deploy a fix) before public disclosure.
What we do
- HTTPS everywhere (TLS 1.2+ via Vercel).
- Authentication via Supabase Auth with optional MFA.
- Postgres row-level security (RLS) enforces user-data isolation.
- Stripe Checkout handles all payment cards — we never see or store card numbers.
- OAuth refresh tokens are encrypted at rest. Service-role secrets are server-side only.
- Daily database backups via Supabase, with quarterly restore verification.
- Rate limits on every public POST endpoint.
- Dependabot scans for vulnerable dependencies.
Machine-readable disclosure policy at /.well-known/security.txt.