The security of your systems and your users' data is Chariow's top priority. We build our services with security measures in place to act in good faith to identify and report potential vulnerabilities.
Last updated: March 15, 2026
TLS 1.3 in transit, AES-256 at rest. Your files are never accessible in plain text on our servers.
Secure servers with automatic backups, geographic redundancy and continuous monitoring.
Every suspicious activity triggers an alert and an immediate investigation by our team.
Chariow is committed to protecting its users' data through rigorous technical and organizational measures. All communications between your browser and our servers are encrypted. Digital files hosted on our platform are stored encrypted at rest on a secure cloud infrastructure with strict access controls.
In the event of a security incident, we immediately activate our response protocol: threat isolation, in-depth investigation, notification of affected users as quickly as possible and deployment of corrective measures. Transparency guides each of our actions.
At Chariow, our mission is to enable content creators to easily sell their digital products. The trust of our users is at the heart of this mission. We have put in place a responsible disclosure program to collaborate with security researchers and help us identify potential vulnerabilities in our services.
If you discover a vulnerability affecting multiple services, we encourage you to ensure separate support for each program concerned. This allows each service to handle the issue independently.
This policy covers information domains, applications and websites accessible via the Internet intended, operated or controlled by Chariow, including all associated subdomains. When a third-party Bug Bounty program applies, third-party systems are outside the scope of responsible delegation.
You are not required to be able to exploit bugs you discover outside the scope of this policy, but we encourage providing proof of concept.
This policy covers technical vulnerabilities targeting our Systems including (but not limited to): SQL injections, XSS (Cross-Site Scripting), privilege escalation, CSRF (Cross-Site Request Forgery), IDOR (Insecure Direct Object Reference), insecure deserialization.
If you discover a security vulnerability in a Chariow system, report it promptly to [email protected]. Include a detailed summary and any supporting evidence (logs, code, proof of concept) to help us understand, validate, reproduce and respond quickly.
At minimum, your report should contain the following information:
We ask that each report be written clearly, contain only one vulnerability per submission and mention any intention of public disclosure. The more detailed and clear your report, the better we will be able to investigate and respond effectively.
While we reserve the right to determine whether you are acting in good faith in accordance with this policy, we will generally presume your good faith if you follow these rules:
If you have questions about this policy or whether your research complies with these guidelines, contact [email protected] before proceeding.
All reports submitted in good faith will be considered. When you responsibly report a vulnerability, we commit to:
If, in our judgment, you make a good faith effort to research and disclose security findings in accordance with our research and disclosure guidelines, we commit to:
You will benefit from this legal protection as long as your disclosure is intentional and in good faith, and you follow our research guidelines.
We reserve the right to modify this policy at any time and publish it on this site. Developers will be kept up to date to maintain the policy as of the effective date of updates.
We would like to thank the following security researchers for their responsible contribution to strengthening Chariow's security.
If you would like to be listed here, please contact us after submitting a valid report at [email protected]. This will allow our team to add you to this list after your vulnerability has been resolved.