Introduction

At Mindvalley, we believe that collaboration with the security community makes the internet safer for everyone. We welcome responsible disclosure of vulnerabilities that may impact the confidentiality, integrity, or availability of our systems or the data of our users. This policy outlines how to report potential security issues to us, what you can expect in return, and how we work with you to address them.

Systems in Scope

This policy applies to all digital assets that are owned, operated, or maintained by Mindvalley, including but not limited to:

  • Web Applications:

*.mindvalley.com

*.mvstg.com

*.mindvalley.dev

*.mindvalley.tech

*.mindvalley.team

  • APIs:

*-api.mindvalley.com

  • Mobile Applications:

Official Mindvalley apps for iOS and Android

If you're unsure whether a system is in scope, please ask before you begin testing. Subdomains not listed above may still be in scope if they are clearly operated by Mindvalley. When in doubt, contact us.

Out of Scope

The following activities are either illegal, pose a risk to user privacy, or lack actionable security value. Engaging in them could result in disqualification from recognition and possible legal escalation:

  • Any third-party platforms or services not owned or managed by Mindvalley

  • Social engineering, phishing, or physical security attacks

  • Denial-of-Service (DoS/DDoS) attacks or resource exhaustion testing

  • Spam or brute-force attacks not tied to a specific vulnerability

  • Clickjacking or the presence of SPF/DMARC/DKIM configurations without specific exploitability

Please report any third-party vulnerabilities to the appropriate vendor or authority.

Our Commitments

If you act in good faith and adhere to this policy, we commit to:

  • Timely Response – Acknowledge receipt of your report within 5 business days

  • Collaborative Investigation – Work with you to understand, validate, and remediate the issue

  • Transparency – Keep you informed on the progress of our mitigation efforts

  • Respect & Recognition – With your consent, recognize your contribution publicly.

  • Safe Harbor – We will not pursue legal action for security research conducted in accordance with this policy

Your Responsiblities

We expect the following from researchers participating in this program:

  • Act in Good Faith – Do not exploit vulnerabilities or access data beyond what's necessary for proof of concept

  • Stay Within Scope – Avoid testing systems not explicitly covered by this policy

  • Respect Legal Boundaries – Do not engage in any testing that violates local or international law, or that affects users or systems not under our control.

  • Minimize Impact – Do not degrade, disrupt, or compromise the availability of our services

  • Avoid Data Breaches – If you encounter sensitive data (e.g., PII, PHI, financial info), stop testing and report immediately

  • Use Official Channels – Submit all reports to security@mindvalley.com or through this Airtable form

  • Allow Reasonable Time – Give us a fair opportunity to address the issue before disclosing it publicly

How to Report

Please submit your reports via security@mindvalley.com or through our Vulnerability Disclosure Form test.

Include the following details:

  • A detailed summary of the issue

  • Affected domain or asset

  • Steps to reproduce the vulnerability

  • Any supporting materials (e.g., screenshots, logs, proof-of-concept code)

  • Your contact information

Safe Harbor

We consider vulnerability research activities to be:

  • Authorized, provided they are carried out in accordance with this policy

  • Protected from legal action by Mindvalley under applicable anti-hacking laws

  • Exempt from Terms of Service restrictions that would otherwise prohibit this activity

If you are ever in doubt about whether your actions fall within this policy, contact us first at security@mindvalley.com.

Note: This Safe Harbor does not extend to actions that are malicious, unlawful, or violate the rights of others. Nor does it cover third-party legal claims.

We reserve the right to make final decisions on whether specific activities fall within the bounds of this policy. Researchers acting outside of these boundaries may lose Safe Harbor protections.

Acknowledgments

We deeply appreciate researchers who help us maintain the security of our platform. With your permission, we may include your name in a public Acknowledgment Hall of Fame in recognition of your contribution.

Sample Hall of Fame Table

NameAffiliationDate ReportedArea of Contribution
Jane DoeIndependent ResearcherJan 15, 2025API Authentication Bypass
AliCyberSec MYFeb 02, 2025XSS in mindvalley.com

Want to be featured here? Make sure to opt in when you submit your report!

Names are only published with explicit opt-in consent in compliance with GDPR and other privacy regulations.

Final Note

Security is a shared responsibility. By working together with the global research community, we aim to build a safer digital experience for all Mindvalley users.

Thank you for your commitment to making technology more secure. Your efforts help us maintain the trust of millions of users worldwide.