
At Sport Heroes, we prioritize the security and privacy of our customers. We recognize and
appreciate the valuable contributions made by security researchers who responsibly disclose
vulnerabilities to us. This policy outlines the terms under which you may conduct security
research on our digital assets and the process for reporting vulnerabilities.
Authorized Research Activities
To ensure your research is considered authorized under this policy, you must:
1. Act in Good Faith: Conduct all research with the intention of improving the security of
Sport Heroes and our customers. Avoid any actions that could damage or negatively
impact our systems, applications, or data.
2. Prompt Notification: Notify Sport Heroes immediately upon discovering a real or
potential security issue. This helps us address vulnerabilities swiftly and minimize
potential harm.
3. Public Disclosure: You may only disclose the vulnerability publicly after we have
deployed a fix, and only with our mutual agreement. This agreement will outline the
timing and details of the disclosure to ensure it aligns with our security protocols.
Prohibited Actions
To protect our systems and the data of our customers, you must not:
1. Unauthorized Data Access: Access, modify, or remove data from accounts you did not
create. Respect the privacy and security of data that does not belong to you.
2. Destructive Testing: Use high-intensity invasive or destructive tools that could cause
harm to our systems or data.
3. Low-Quality Submissions: Submit reports that are of low quality, such as those
containing only the results of automated scanners without additional analysis or context.
4. Restricted Testing Methods:
○ Denial of Service (DoS or DDoS) attacks, or any other activity that impairs
access to our systems or damages data.
○ Physical testing, including attempts to gain unauthorized access to our office
spaces or equipment.
○ Social engineering tactics, including phishing or any other form of non-technical
vulnerability testing.
○ Unauthorized disclosure of findings to any third party without prior written consent
from Sport Heroes.
5. Exploitation of Vulnerabilities: Do not exploit vulnerabilities beyond what is necessary
to confirm their existence. This includes:
○ Compromising or exfiltrating data.
○ Establishing persistent access or command-line control.
○ Pivoting to other systems. If you are uncertain about the extent of testing
required, report the issue to us first.