Vulnerability disclosure at MyMedicineAdvisor exists to protect our users and systems. If you’ve found a potential security issue, please report it to us through the process below. We commit to 24-hour triage, coordinated fixes, clear communication, and good-faith safe harbor for researchers who follow this policy.
How our vulnerability disclosure works
Our vulnerability disclosure program encourages good-faith testing and responsible reporting. We evaluate reports for impact and exploitability, assign priority, and work toward remediation. Security research must not harm users, disrupt service, or access personal/medical data.
- See our Privacy Requests, Privacy Policy, Report a Correction, and Press & Media pages.
- Read about responsible disclosure at OWASP and coordinated disclosure guidance from CISA.
Scope for vulnerability disclosure
The following are in scope for vulnerability disclosure testing:
- Domains:
mymedicineadvisor.com
and any*.mymedicineadvisor.com
subdomains we operate. - First-party web applications and APIs we control.
- Publicly available mobile or desktop clients (if/when released by us).
Not in scope: third-party services (hosting, analytics, payment, marketing) unless we explicitly state otherwise. Issues within vendors should be reported to them directly.
Out-of-scope & prohibited testing
To keep users and systems safe, the following are out of scope for vulnerability disclosure and must not be performed:
- Denial-of-Service (volumetric, resource exhaustion, or stress tests).
- Automated account brute force, credential stuffing, or social engineering.
- Accessing, modifying, or exfiltrating personal/medical data (PHI/PII).
- Physical attacks (office, devices), or third-party/vendor platforms.
- Spam/SEO poisoning, clickjacking on non-sensitive pages, and missing
X-Frame-Options
where no sensitive action is at risk. - Self-XSS, CSRF on logout/non-state-changing actions, and version banners without proven exploitability.
- Scanning that degrades service (excessive rates). Keep requests polite and bounded.
If you’re unsure whether a method is permitted under this vulnerability disclosure policy, email us first.
Submission format for vulnerability disclosure
Send reports to support@mymedicineadvisor.com (PGP available on request) or use the form below.
Provide:
- Title and concise summary of the vulnerability.
- Affected URL(s)/endpoint(s) and parameters.
- Impact (what can an attacker achieve) and severity rationale.
- Step-by-step reproduction + minimal proof-of-concept.
- Your environment (browser, OS, tool versions).
- Fix suggestions if you have them.
- Contact for coordinated follow-up.
Our timelines & communications
We aim to:
- Acknowledge your vulnerability disclosure within 24 hours.
- Provide status updates at meaningful milestones (triaged → in progress → fixed).
- Credit researchers who want public acknowledgment (see below).
- Request a mutually agreed public disclosure date after a fix is deployed and users are protected.
Acknowledgments & recognition
We currently run a non-monetary recognition program. With your consent, we’ll add your name/handle to a Security Hall of Fame and, where appropriate, link to a write-up once the issue is safely disclosed and fixed. Swag/thank-you gifts may be offered at our discretion for high-impact findings.
Emergency procedures
If you discover a high-severity issue that could put users at immediate risk:
- Mark the subject: “URGENT: High-Severity Vulnerability Disclosure”.
- Share a minimal PoC privately; do not publish or test further.
- We will escalate internally and keep you updated on the fix timeline.
FAQ: vulnerability disclosure
Vulnerability Disclosure form
Help & Support
Last Updated – 13 September 2025