Third-party services (Apple App Store servers, Google Play servers, Cloudflare infrastructure itself)
Social engineering of Water Table Game staff
Volumetric denial-of-service attacks
Automated scanner noise without a demonstrated exploitable impact
Phase-2b community features — not yet live; no user-generated-content surface exists at Launch-1
Reward Program
No monetary bounty. This is an acknowledge-only program. We do not maintain HackerOne or Bugcrowd accounts.
What you get: The first inbound responsible disclosure that results in a valid fix receives manual recognition on /security/acknowledgments with:
Your preferred display name (or "Anonymous" if you prefer)
Timestamp of disclosure
Scope of finding (e.g., "IAP receipt validation bypass")
We will not credit findings that do not result in a shipped fix, findings that were already known, or findings outside the scope above.
Disclosure Process
Email [email protected] with subject line [DISCLOSURE] <brief description>.
Include: affected system, reproduction steps, impact assessment, your preferred display name for acknowledgments.
We will acknowledge receipt within 7 days.
Coordinated disclosure window: 90 days from our acknowledgment. We ask that you do not publish details before we ship a fix or before the 90-day window expires, whichever comes first.
If we miss the 7-day acknowledgment, you may publish after a good-faith follow-up to the same address.
Legal Safe Harbor
Water Table Game LLC will not pursue legal action against researchers who:
Disclose to us in good faith per this policy
Avoid privacy violations, data destruction, or service disruption
Do not access data beyond what is necessary to demonstrate the vulnerability
Do not exploit a vulnerability beyond the minimum necessary to confirm its existence
We consider good-faith security research consistent with this policy to be authorized activity.