Features
© Teacher Tools Pvt. Ltd.
This Responsible Vulnerability Disclosure Policy (“Policy”) outlines how security researchers and members of the public (“you,” “researcher(s)”) can report potential security vulnerabilities in Toddle Services. It provides a clear and lawful way to support responsible security research and enable timely remediation.
We are committed to:
Please note: This policy does not grant indemnity for any actions that breach the law or violate its terms, nor does it create any indemnity obligation on the part of Toddle or any third party.
The following Toddle assets are currently in scope:
If you are uncertain whether an asset is covered, contact Toddle before testing.
The following are out of scope and must not be tested or reported:
As long as you follow this policy and act in good faith, we consider your research authorized. We’ll work with you to understand and fix the issue. For actions to avoid, see Prohibited Activities right after this section.
Handling Sensitive Data
If you inadvertently access personal or confidential data, service configurations, or cause a disruption to our systems:
Third-Party Vulnerabilities
If the issue reported involves a third-party library, tool, or vendor, we may share relevant information with that party and, with your consent, also share your contact details to coordinate resolution.
Researchers must not:
Researchers must securely delete any data retrieved during testing once it is no longer required to verify the issue or within one month of resolution, whichever is earlier. Toddle will confirm when the vulnerability has been resolved so you can proceed with deletion.
If you’ve found a potential vulnerability in any of our products or services, please let us know by emailing security@toddleapp.com. To help us investigate quickly and thoroughly, your submission should contain:
This is a private and confidential disclosure process. Please do not publish, share, or discuss any details of the vulnerability, including proof-of-concept code, without written permission from Toddle. If public disclosure becomes appropriate, we will work with you to coordinate a safe and responsible release.
If your report includes sensitive information, we recommend encrypting it before sending. If you’re unsure how to do this or need support, feel free to contact us and we’ll assist you.
After you submit your report, our security team will review and assess the issue. We will keep you updated throughout the process. Please allow us a reasonable window to investigate and resolve the issue. We ask that all communication about the report remains confidential during this time.
We deeply appreciate the contributions of security researchers who help us make Toddle more secure. While we do not offer guaranteed rewards, if you are the first to report a valid vulnerability that leads to a confirmed fix, you may receive one of the following as a token of appreciation:
Recognition is discretionary and based on the quality of the report, the severity of the issue, and its contribution to improving our security.
To keep our disclosure programme open and globally inclusive, please ensure that you meet all of the following conditions:
If you act in good faith, avoid any behavior outlined in Prohibited Activities, meet the Eligibility Criteria, and report the issue directly to us without public disclosure, we will not pursue legal action against you or ask law enforcement to investigate your actions.
Nothing in this Policy grants you (i) permission to act in a manner that would cause Toddle to violate applicable laws or (ii) ownership rights to Toddle intellectual property or data. This Policy shall be governed by and construed in accordance with the laws of India, and any disputes shall be subject to the exclusive jurisdiction of the courts of Bengaluru, India.
Toddle reserves the right to modify this policy at any time. We recommend regularly reviewing this policy for updates.
For questions regarding this Policy, please contact security@toddleapp.com.
Array
(
[SERVER_SOFTWARE] => LiteSpeed
[REQUEST_URI] => /responsible-vulnerability-disclosure-policy/
[LSPHP_ProcessGroup] => on
[PATH] => /usr/local/bin:/bin:/usr/bin
[HTTP_ACCEPT] => */*
[HTTP_ACCEPT_ENCODING] => gzip, br, zstd, deflate
[HTTP_HOST] => www.toddleapp.dev
[HTTP_REFERER] => https://www.toddleapp.dev/responsible-vulnerability-disclosure-policy
[HTTP_USER_AGENT] => Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
[DOCUMENT_ROOT] => /home/u964594443/domains/toddleapp.dev/public_html
[REMOTE_ADDR] => 216.73.216.118
[REMOTE_PORT] => 6928
[SERVER_ADDR] => 145.223.115.140
[SERVER_NAME] => www.toddleapp.dev
[SERVER_ADMIN] =>
[SERVER_PORT] => 443
[REQUEST_SCHEME] => https
[REDIRECT_URL] => /responsible-vulnerability-disclosure-policy/
[REDIRECT_REQUEST_METHOD] => GET
[GEOIP_ADDR] => 216.73.216.118
[GEOIP_CONTINENT_CODE] => NA
[GEOIP_COUNTRY_CODE] => US
[GEOIP_COUNTRY_NAME] => United States
[GEOIP_CITY] => Columbus
[GEOIP_POSTAL_CODE] => 43215
[GEOIP_CITY_CONTINENT_CODE] => NA
[GEOIP_CITY_COUNTRY_CODE] => US
[GEOIP_CITY_COUNTRY_NAME] => United States
[GEOIP_REGION] => OH
[GEOIP_DMA_CODE] => 535
[GEOIP_LATITUDE] => 39.96250
[GEOIP_LONGITUDE] => -83.00610
[GEOIP_ISP] => 16509
[GEOIP_ORGANIZATION] => AMAZON-02
[HTTPS] => on
[CRAWLER_USLEEP] => 1000
[CRAWLER_LOAD_LIMIT_ENFORCE] => 25
[H_PLATFORM] => Hostinger
[H_TYPE] => business
[H_CANARY] => false
[H_STAGING] => false
[LSCACHE_VARY_VALUE] => UnitedStates
[HTTP_AUTHORIZATION] =>
[REDIRECT_STATUS] => 200
[UNIQUE_ID] => ZkW16PEE-2DB1A6NLBV4PztQ
[X_SPDY] => HTTP2
[SSL_PROTOCOL] => TLSv1.3
[SSL_CIPHER] => TLS_AES_256_GCM_SHA384
[SSL_CIPHER_USEKEYSIZE] => 256
[SSL_CIPHER_ALGKEYSIZE] => 256
[SCRIPT_FILENAME] => /home/u964594443/domains/toddleapp.dev/public_html/index.php
[QUERY_STRING] =>
[SCRIPT_URI] => https://www.toddleapp.dev/responsible-vulnerability-disclosure-policy/
[SCRIPT_URL] => /responsible-vulnerability-disclosure-policy/
[SCRIPT_NAME] => /index.php
[SERVER_PROTOCOL] => HTTP/1.1
[REQUEST_METHOD] => GET
[X-LSCACHE] => on,crawler,esi,combine
[PHP_SELF] => /index.php
[REQUEST_TIME_FLOAT] => 1764540631.9833
[REQUEST_TIME] => 1764540631
)