Zeeh Logo

Zeeh

LoginContact sales

Zeeh Africa

Vulnerability Disclosure Policy

Last Updated: March 2026

Zeeh Africa is committed to ensuring the security and privacy of our users, partners, and systems. We value the work of security researchers and the broader community in helping us identify and address vulnerabilities responsibly.

Reporting a Vulnerability

If you believe you have discovered a security vulnerability in any Zeeh Africa system, service, or product, please report it to us as soon as possible.

Contact Email: security@zeeh.africa

Please include the following details in your report:

  • A clear description of the vulnerability
  • Steps to reproduce the issue
  • Any proof-of-concept code, screenshots, or supporting materials
  • The potential impact of the vulnerability

Our Commitment

When you report a vulnerability to us, we commit to:

  • Acknowledge receipt of your report within a reasonable timeframe
  • Investigate and validate the issue promptly
  • Keep you informed of progress where appropriate
  • Work to remediate confirmed vulnerabilities in a timely manner

Scope

This policy applies to all publicly accessible Zeeh Africa systems, domains, and services unless explicitly stated otherwise.

Responsible Disclosure Guidelines

We ask that you:

  • Act in good faith and avoid privacy violations, data destruction, or service disruption
  • Do not exploit vulnerabilities beyond what is necessary to demonstrate the issue
  • Do not access, modify, or delete data that does not belong to you
  • Give us a reasonable amount of time to resolve the issue before public disclosure

Out of Scope

The following are generally considered out of scope:

  • Vulnerabilities in third-party services not under Zeeh Africa's control
  • Social engineering attacks
  • Physical attacks against facilities or personnel
  • Denial of Service (DoS/DDoS) attacks

Safe Harbor

Zeeh Africa will not pursue legal action against researchers who:

  • Comply with this policy
  • Act in good faith
  • Avoid causing harm to users, systems, or data

Recognition

While we do not currently offer a bug bounty program, we appreciate the contributions of security researchers and may acknowledge valid reports at our discretion.

Thank you for helping keep Zeeh Africa and our users safe.

ndpr
Zeeh Logo

Zeeh

© All right reserved, Zeeh 2024