Hi Team,
As part of a routine DNS security audit, I identified a
critical misconfiguration in your domain’s DMARC policy
that renders it non-functional and exposes your email infrastructure to spoofing, phishing, and deliverability issues.
### Vulnerability Summary
Your domain has a DMARC policy published at
_dmarc.vfat.io
with the following configuration:
v=DMARC1; p=reject; rua=mailto:info@vfat.tools
While it uses the recommended policy (
p=reject
), the configuration includes a
reporting address on an external domain
(
vfat.tools
)
without the required permission record
, causing the entire DMARC policy to be considered
invalid
by mail receivers.
### Impact
*
Policy Rejection
: Since the external reporting destination is unauthorized, DMARC receivers treat the policy as
invalid
and ignore it.
*
Spoofing & Phishing Risks
: With the DMARC policy ignored, malicious actors can forge emails that appear to come from
@vfat.io
, potentially targeting your users, partners, or clients.
*
Failure to Detect Attacks
: No aggregate reports (RUA) are successfully sent, so you lose insight into how your domain is being used or abused.
*
Deliverability & Compliance Issues
: Many email services check for valid DMARC, and an invalid record can lead to your messages being flagged, blocked, or marked as suspicious—negatively impacting your business communication and legal compliance (GDPR, CAN-SPAM).
### Recommended Fix
To make this policy valid and enforceable:
  1. Publish a permission record
    on the destination domain
    vfat.tools
    at the following location:
vfat.tools TXT _report._dmarc.vfat.io "v=DMARC1"
  1. Alternatively, change the
    rua
    field to an internal reporting address on the same domain (e.g.,
    rua=mailto:dmarc@vfat.io
    ).
  2. After correcting, validate the updated DMARC record using a DMARC analyzer or an online validation tool.
I recommend treating this as a priority. Kindly let me know if you offer any compensation for responsible vulnerability disclosures. I also have additional findings and critical issues available to share upon confirmation.
Best regards,
Security Researcher