We are primarily interested in vulnerabilities in the following categories:
The following vulnerability categories are considered out of scope of our responsible disclosure program and should be avoided by researchers.
Please note that you are expected to engage in security research responsibly. For example, if you discover a publicly exposed password or key, you should not use the key to test the extent of access it grants or to download or exfiltrate data in order to prove it is an active key. Similarly, if you discover a successful SQL injection, you are expected not to exploit the vulnerability beyond any initial steps needed to demonstrate your proof-of-concept. Excessive exfiltration or downloading of Levitate data, or demanding payment in return for destruction of Levitate data, will be considered outside of the scope of this program, and Real Magic will reserve all of its rights, remedies, and actions to protect itself and its users.
Our program does not currently provide any monetary rewards.
To report a vulnerability, please send an email to email@example.com.