Inloggen Contact

LAST UPDATED: JANUARY 2026

Responsible Disclosure Hall of Fame

Responsible Disclosure Hall of Fame

At Pescheck, we deeply value the contributions of ethical hackers and security researchers who help us improve the safety and reliability of our platform.

The individuals listed below have responsibly disclosed vulnerabilities to us and helped make Pescheck safer for everyone. We appreciate their time, effort, and dedication.

Want to report a vulnerability?
Please read our Responsible Disclosure Policy and follow the steps outlined there.

⭐ Honored Researchers

Hacker Icon

Sheldon Angelo Menezes

🥇 January 2026

LinkedIn: Sheldon Angelo Menezes

  • Unauthenticated User Enumeration in SSO Detection Endpoint
Hacker Icon

Vasu Ghetiya

🥇 January 2026

LinkedIn: Vasu Ghetiya

  • Rate Limit Bypass on Password Reset Function
Hacker Icon

Haris Ragavendra

🥇 December 2025

LinkedIn: Haris Ragavendra

  • Application-level resource exhaustion via unrestricted input on support endpoint.
Hacker Icon

Delbert Giovanni

🥇 December 2025

LinkedIn: Delbert Giovanni

  • Stored Cross-Site Scripting (XSS) via unsanitized Email field.
Hacker Icon

Naguru Babji

🥇 December 2025

LinkedIn: Naguru Babji

  • Lack of rate limiting on password reset endpoint leading to email flooding.
Hacker Icon

Ritanshu Sharma

🥇 December 2025

LinkedIn: Ritanshu Sharma

  • Improper Invitation Validation Enables Unauthorized Users to Join Any Organisation
Hacker Icon

Team-DisclosureX Cybrgen

🥇 December 2025

LinkedIn: Cybrgen Limited

  • Rate Limit Bypass via Race Condition — Mass Webhook Creation
Hacker Icon

Yadnesh Chavhan

🥇 November 2025

LinkedIn: Yadnesh Chavhan

  • Password change did not terminate existing sessions.
Hacker Icon

Pathan Aslam

🥇 November 2025

LinkedIn: Pathan Aslam

  • No rate limiting / brute-force protection on login endpoint.
Hacker Icon

Biswajeet Ray

🥇 November 2025

LinkedIn: Biswajeet Ray

  • PHP Info Disclosure — Sensitive PHP Configuration Exposed on mail.pescheck.io
Hacker Icon

Pushpraj Patil

🥇 October 2025

LinkedIn: Pushpraj Patil

  • Race Condition — Multiple Organizations Creation with Same Details Leads to Restriction Bypass
Hacker Icon

Rajvinder Singh Pawar

🥇 October 2025

LinkedIn: Rajvinder Singh Pawar

  • Race Condition in Email Addition Functionality
Hacker Icon

Sanjay Jogi

🥇 October 2025

LinkedIn: Sanjay Jogi

  • Rate limiting observation on resend verification endpoint
Hacker Icon

Naitik Gupta

🥇 October 2025

LinkedIn: Naitik Gupta

  • Unsanitized org name allowed attacker-controlled clickable URLs
  • Rate limiting bypass on email invitations via case-variant addresses
Hacker Icon

Akshay Shelke

🥇 October 2025

LinkedIn: Akshay Shelke

  • Lack of password confirmation when disabling Two-Factor Authentication
Hacker Icon

Naeem P

🥇 October 2025

LinkedIn: Naeem P

  • Improper server-side validation of Terms & Conditions acceptance across multiple endpoints
Hacker Icon

4osp3l

🥇 October 2025

X (Twitter): @4osp3l

  • Arbitrary HTML injection in webhook functionality allowing HTML/JS execution
Hacker Icon

Harshvardhan Kumavat

🥇 October 2025

LinkedIn: Harshvardhan Kumavat

  • Authentication bypass via unverified secondary email
Hacker Icon

Michał Biesiada

🥇 October 2025

LinkedIn: Michał Biesiada

  • Logic flaw allowing unverified secondary email to block legitimate registration
Hacker Icon

Yash K Jare

🥇 October 2025

LinkedIn: Yash K Jare

  • No rate limit on “Add Webhook” feature
  • Weak password policy allowed easily guessable passwords
Hacker Icon

Praveen Jha

🥇 October 2025

LinkedIn: Praveen Jha

  • Missing rate limiting on password reset endpoint allowed email flooding
Hacker Icon

Ajay Saxena

🥇 October 2025

LinkedIn: Ajay Saxena

  • Email verification bypass allowed login without activation
Hacker Icon

Garv Sanwariya

🥇 October 2025

LinkedIn: Garv Sanwariya

  • XSS via SVG upload in theme logo preview
Hacker Icon

Nikhil Singh Rajput

🥇 September 2025

LinkedIn: Nikhil Singh Rajput

  • Stored XSS via email input
  • Sensitive data exposure via web archive
  • Missing rate limiting on support system
Hacker Icon

A Sai Vardhan

🥇 August 2025

LinkedIn: A Sai Vardhan

  • Password reset token reuse
  • Terms & Conditions acceptance bypass
Hacker Icon

Vedant Tanaji Vhatkar

🥇 August 2025

LinkedIn: Vedant Tanaji Vhatkar

  • Password reset session handling issue
  • Rate limiting on account deletion flow
  • Error-state session restoration in password reset
Hacker Icon

Kunal Mhaske

🥇 March 2025

LinkedIn: Kunal Mhaske

🙏 Recognition & Appreciation

We don’t have an official bug bounty program yet, but we do like to recognize and thank those who go the extra mile to help us improve.

Every researcher listed here has contributed to making the internet a safer place, and we’re grateful for their responsible approach to security research.

Thank you for helping us protect our users and their data.