Shopping cart

Security & Vulnerability Disclosure

Beshi Khushi handles security reporting as part of its wider responsibility to protect user privacy, account safety, and platform integrity.

Because our platform operates in a sensitive area of personal wellbeing and sexual wellness, security is not treated as a background technical matter. It is part of how we protect trust, discretion, and safe access to information, products, and support.

This page explains how to report a potential security issue, what kinds of reports are relevant, how those reports are reviewed, and the standards we expect from anyone reporting a vulnerability in good faith.

Responsible Disclosure

We welcome responsible, private reporting of genuine security vulnerabilities.

If you believe you have identified a weakness in our website, systems, or account protections, we ask that you report it directly to us before sharing it publicly. This gives us a fair opportunity to investigate the issue, reduce risk, and protect users from unnecessary exposure.

We value reports that are made carefully, honestly, and without causing harm. Responsible disclosure helps strengthen the platform. Irresponsible disclosure can put users, accounts, and sensitive information at risk.

What This Policy Covers

This policy applies to security-related concerns involving Beshi Khushi’s digital platform, including website functionality, account access protections, authentication controls, data handling risks, and platform abuse pathways that may affect integrity or user safety.

  • It covers technical issues that could reasonably lead to unauthorized access,
  • exposure of personal information,
  • misuse of protected functions,
  • disruption of core services, or other material risks to confidentiality, integrity, or availability.

What We Ask You to Report

You should report issues that could create a meaningful security or privacy risk.
 

This may include : 

  • account takeover vulnerabilities,
  • authentication or authorization bypass,
  • exposed personal or sensitive data, insecure access controls,
  • or flaws that could be used to interfere with platform reliability or trusted site content.

We also encourage reports where a weakness may not yet have been exploited but could realistically be used in a way that harms users, compromises privacy, or weakens trust in the platform.

What This Policy Does Not Cover

This reporting channel is for legitimate security concerns only.

  • It is not intended for customer support matters, order issues, password reset help, account change requests, product complaints, content preferences, design suggestions, or general usability feedback.
  • We also do not accept as valid security reporting any activity that involves intimidation, extortion, social engineering, deliberate service degradation,
  • unauthorized access to data, or testing methods that go beyond what is reasonably necessary to identify and describe a potential issue.
  • If a report depends on accessing, copying, changing, or exposing information that does not belong to you, that is not responsible disclosure.

How to Report a Vulnerability

If you believe you have found a genuine security issue, please contact us privately by email.

A useful report should be clear enough for our team to understand what happened, where it happened, and why it matters. Where possible, include the affected page, URL, feature, or flow, a description of the issue, practical steps to reproduce it, screenshots if appropriate, and a short explanation of the potential impact.

Please do not include unnecessary personal, medical, financial, or intimate information in your report. If the issue involves sensitive data, share only what is strictly needed for verification and keep your disclosure limited and careful.

Responsible Testing Expectations

We expect reporters to act conservatively and in good faith.

That means you should avoid accessing or attempting to access other users’ accounts, data, or personal information.
You should not alter, delete, download, or retain data that is not yours. You should not attempt to disrupt the availability of the website, interfere with normal operations, or use automated or aggressive methods that create avoidable strain on the platform.

Demonstrating that a vulnerability exists is one thing.Expanding the test in a way that creates exposure, instability, or harm is another. We expect the first, not the second.

How We Review Security Reports

All credible security reports are reviewed internally by the relevant technical and governance teams.

Each report is assessed based on context, plausibility, potential impact, severity, scope, and the likelihood that the issue could be exploited in a real-world setting. Not every report will qualify as a confirmed vulnerability, but each credible submission is reviewed on its merits.

Where an issue is verified, we take remediation steps appropriate to the nature of the risk. That may include code fixes, access-control changes, monitoring improvements, process updates, or other measures designed to reduce exposure and strengthen protection going forward.

Communication and Timelines

We aim to acknowledge genuine security reports within a reasonable timeframe.

Resolution timing depends on the nature of the issue. Some vulnerabilities can be reviewed and addressed relatively quickly. Others require deeper investigation, testing, staged deployment, or coordination across systems. For that reason, we cannot promise a fixed resolution timeline for every report.

We may not be able to provide detailed technical updates in every case. However, credible reports are recorded, assessed, and handled through our internal review process with appropriate seriousness.

No Bug Bounty or Reward Program

Beshi Khushi does not currently operate a bug bounty or paid vulnerability reward program.

Responsible disclosure is appreciated because it supports user protection and platform integrity, but submitting a report does not create any entitlement to payment, compensation, or public recognition unless Beshi Khushi expressly decides otherwise.

Contact for Security Reports

For security or vulnerability-related concerns, please contact:

Support hours: Saturday to Thursday, 9:00 AM to 10:00 PM (Bangladesh) 

Please use these contacts for security-related reporting only. General customer service questions should be sent through the appropriate support channel so they can be handled more efficiently.

Policy Governance

This policy is maintained as part of Beshi Khushi’s Trust & Safety governance framework and is reviewed periodically.

We may update it to reflect changes in platform architecture, operational practices, risk management standards, legal obligations, or the practical needs of protecting users in Bangladesh. Any updates are intended to improve clarity, strengthen accountability, and support safer handling of security-related concerns.

At Beshi Khushi, security is not treated as a marketing claim or a box-ticking exercise. It is part of the basic standard required to run a privacy-sensitive platform responsibly.

Medical Disclaimer and Sources & References Policy.


Operational governance: Beshi Khushi Trust & Safety · Effective date: 12 October 2025 · Last reviewed: 25 March 2026 · Version: 1.1

🔥Join the VIP Club & Save Instantly! 🔥Join the VIP Club & Save Instantly! 🔥Join the VIP Club & Save Instantly! 🔥Join the VIP Club & Save Instantly!
🔥Join the VIP Club & Save Instantly!
Unlock 10% OFF + early access to new deals, tips & arrivals!

🔥Join the VIP Club & Save Instantly!

Your experience on this site will be improved by allowing cookies Cookie Policy