Security
Security Policy
Last updated: December 30, 2025
At SupportKori, protecting your personal and financial information is not just a policyâitâs the foundation of our service. Below are the measures we take to keep you safe and how you can help.
1Our Security Measures
We employ industry-standard technologies to shield our platform from threats.
- Cloudflare CDN:We use Cloudflare to improve performance and protect against DDoS attacks, ensuring SupportKori remains available 24/7.
- SSL Encryption:All data transmitted between your browser and our servers is encrypted using TLS 1.3/SSL protocols.
- Database Security:Our databases are hosted within a private network, accessible only to authorized personnel with strict access controls.
- Rate Limiting:To prevent abuse and brute-force attacks, we implement intelligent IP rate limiting on all API endpoints.
2Reporting Vulnerabilities
We welcome the sharp eyes of the security community. If you are a security researcher and discover a vulnerability, please report it to us immediately.
How to report: Email us at security@supportkori.com.
Please include detailed steps to reproduce the issue. We appreciate your discretion in keeping the details private until we resolve the issue.
How to report: Email us at security@supportkori.com.
Please include detailed steps to reproduce the issue. We appreciate your discretion in keeping the details private until we resolve the issue.
3Prohibited Actions
To maintain a safe environment for Bangladeshi creators, the following actions are strictly prohibited:
- Social Engineering: Phishing or attempting to trick users into revealing passwords.
- Malware Distribution: Using SupportKori links to host viruses or harmful software.
- Spamming: Sending unsolicited messages or advertisements to creators.
- Scraping: Automated scraping or indexing of our creator data without permission.
- Reverse Engineering: Attempting to decompile or access our source code unauthorized.
4Hall of Fame & Recognition
If you identify a valid security issue and report it responsibly, we will recognize your contribution in our Hall of Fame.
Criteria for recognition:
Criteria for recognition:
- You must be the first person to report the specific vulnerability.
- The vulnerability must be a valid security risk (not just a UX bug).
- You must not have exploited the bug to damage data or harm users.