|Scope Type||Scope Name|
|undefined||Design flaws which could be exploited|
|undefined||Insecure default config/settings|
|undefined||Usage of insecure (deprecated) algorithms|
|undefined||Poor/incorrect usage of a package/dependency resulting in a vulnerability|
|undefined||Denial of service|
|undefined||Social engineering (including phishing) of passhash staff or contractors|
|undefined||Any physical attempts against passhash property or data centers|
|undefined||Vulnerabilities with source code host/provider (e.g. github)|
|undefined||Vulnerabilities where the root cause is upstream (e.g. a dependency with a vulnerability)|
No technology is perfect, and passhash believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.
Thank you for helping keep passhash and our users safe!