Resumate is source-available software, free for non-commercial use. All security reports and vulnerabilities should be reported through official channels.
If you discover a security vulnerability in Resumate, please follow these steps:
- Email us immediately at: etherjoon@gmail.com
- Include detailed information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Your contact information
- Wait for our response before disclosure
- Work with us to resolve the issue
- Do NOT publicly disclose the vulnerability
- Do NOT share details on social media or forums
- Do NOT exploit the vulnerability
- Do NOT share with unauthorized parties
Security reports are accepted for:
- Official Resumate repository
- Documented security vulnerabilities
- Initial Response: Within 24 hours
- Status Update: Within 72 hours
- Resolution Timeline: Varies by severity
Licensed users who responsibly disclose security vulnerabilities may be:
- Acknowledged in our security hall of fame
- Eligible for bug bounty rewards (for licensed users)
- Receive extended support benefits
- Security Team: etherjoon@gmail.com
- Licensing Issues: etherjoon@gmail.com
- General Support: etherjoon@gmail.com
- GitHub: https://github.com/DecoderX108/resumate
Unauthorized security testing, penetration testing, or vulnerability scanning of Resumate without explicit written permission is strictly prohibited and may constitute a violation of:
- Computer Fraud and Abuse Act (CFAA)
- Digital Millennium Copyright Act (DMCA)
- International cybercrime laws
Only authorized users with explicit written permission may perform security testing.
Β© 2025 Resumate. All Rights Reserved.