From 606f96070dd5aa29b89426191b08eef46e10f4f5 Mon Sep 17 00:00:00 2001 From: EdOverflow Date: Mon, 17 Jul 2023 18:16:57 +0100 Subject: [PATCH] Separate paragraphs in README warning section --- README.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 1c2d25d..4293817 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,11 @@ ## Disclaimer :warning: -**The authors of this document take no responsibility for correctness. This project is merely here to help guide security researchers towards determining whether something is vulnerable or not, but does not guarantee accuracy. This project heavily relies on contributions from the public; therefore, proving that something is vulnerable is the security researcher and bug bounty program's sole discretion. Furthermore, it is important to clarify that this project does not aim to identify or disclose bypasses to security measures implemented by various services. Instead, it is expected that such bypasses be reported directly to the affected service for appropriate action. Finally, it is worth noting that some bug bounty programs may accept dangling DNS record reports without requiring proof of compromise.** +**The authors of this document take no responsibility for correctness. This project is merely here to help guide security researchers towards determining whether something is vulnerable or not, but does not guarantee accuracy. This project heavily relies on contributions from the public; therefore, proving that something is vulnerable is the security researcher and bug bounty program's sole discretion.** + +**Furthermore, it is important to clarify that this project does not aim to identify or disclose bypasses to security measures implemented by various services. Instead, it is expected that such bypasses be reported directly to the affected service for appropriate action.** + +**Finally, it is worth noting that some bug bounty programs may accept dangling DNS record reports without requiring proof of compromise.** ## What is a subdomain takeover?