Security Vulnerabilities & Improvements

Please submit your suggestions to:

You may be contacted for a follow-up depending on the suggestion/vulnerability highlighted. 

Do not engage in malicious activity!

Examples include denial of service, viewing another user's private data or modifying data without authorization.


Tempsee recognizes the importance of those who contribute to the security of our website. To encourage bug and vulnerability reports, we will commit to not bringing private action nor public inquiry against researchers who follow these guidelines such that the vulnerability:

  • is reported to Tempsee via the above email as soon as possible
  • is not published elsewhere
  • exists on a domain owned by Tempsee (e.g. *
  • is verifiable by our security team


Please include the following information in your submission:

  • a proof-of-concept or demonstration of the vulnerability
  • detailed instructions on how to reproduce the vulnerability
  • an e-mail address we can contact you at


Vulnerabilities that are deemed especially worthy by the security team may be rewarded in the following ways:

  • a name or company of the researcher's choosing published on Tempsee social medias
  • a special "Thank you" present shipped at the researcher's address