We are AGRO-TECH COMPANY
Amar Agro is dedicated to safeguarding the privacy and data of its clients. We also acknowledge the critical role security researchers play in assisting us in maintaining the security of our systems. As a result, we cordially invite security researchers to voluntarily reveal any possible security holes in our systems.
Please email us at support@amaragrotech.org if you think you have discovered a security flaw in any of the Amar Agro platforms. Any vulnerability that is reported will be looked into, and the problem will be fixed as soon as possible. To make sure that any vulnerabilities are appropriately fixed, we are dedicated to collaborating with security researchers. We appreciate your assistance in protecting the privacy and data of our clients in advance.
Reporting Guidelines
Could you please provide the following report information?
an explanation of the weakness and its potential consequences;
a detailed description of the steps required to reproduce the vulnerability; and,
A video proof of concept, if available.
Email to support@amaragrotech.org
Policy
We inquire that: -
Security researchers are not allowed to infringe on our clients' privacy or interfere with our services' accessibility.
It is imperative that security researchers adhere to all relevant legal requirements when conducting their work.
It is recommended that security researchers responsibly reveal any potential security flaws and include enough information to enable Amar Agro to replicate and fix the problem.
Security researchers are required to hold off on disclosing any suspected security flaws to the public until after Amar Agro has had a fair chance to address and fix the problem.
No client data from Amar Agro may be accessed or used by security researchers without authorization.
It is not acceptable for security researchers to try to gain unauthorized access to any Amar Agro systems or exploit vulnerabilities.
Without authorization, security researchers should not try to reverse engineer any Amar Agro systems or code.
Researchers studying security must never alter any data.