Browse over 9,000 car reviews
Text Message Fraud: carsguide.com.au encourages you to take precautionary measures when responding to possible buyers and any text message requests for personal details such as email. We encourage you to not respond via email to interested parties as this is a common fraud practice. Please Note: carsguide.com.au will not contact you via SMS at any stage other than during step one of creating your car advertisement. This text will only ever include a verify code to enter during step one of uploading your car details. carsguide.com.au will never request you to do this more than once. Check out these examples.
carsguide Solutions or Secure carsguide or cars guide Support: carsguide.com.au is NOT associated with and does not recommend that buyers/sellers utilise ANY 3rd party websites that are not directly linked from carsguide.com.au. We urge users to take caution when communicating with sellers and look out for any potential scammers. In particular, carsguide.com.au is not associated with any payment services such as PayProtect, which is not available on the carsguide platform. If someone asks you to send money via PayProtect or a 3rd party platform you should contact us immediately.
Money to post advertisements - carsguide has become aware that scammers have started offering people money to post multiple Ads on the site. If you have responded to a job offer like this recently please contact us using the below form. Any abuse of the website will be reported to the police.
At Carsguide we take user safety seriously and strive to ensure a safe experience for you when you use our websites. When properly reported, we will quickly investigate all legitimate reports of security vulnerabilities and try to fix potential problems. We have adopted a responsible disclosure policy to encourage reports.
We recognize the important role that security researchers and our community play in keeping Carsguide and our customers secure. If you believe you've found a vulnerability, we would like to work with you to investigate it as quickly as possible. Please send us as much information as possible to help us better understand the nature and scope of the possible issue.
In the event you discover a site or product vulnerability, please notify us using the guidelines below. In order to enable us to review your notification and respond to your report, we will require some time to review. Therefore, we kindly request you to give us reasonable time to revert before you make any information public regarding the vulnerability and make a good faith effort to avoid destruction of data and interruption or degradation of our service during your research. In the event we believe you are not acting in good faith, we reserve all rights to bring a lawsuit against you or ask law enforcement to investigate you.
Do not engage in security research that involves:
If you believe you have discovered a site or product vulnerability in a Carsguide hosted website, please send a report with a thorough explanation of the vulnerability via Zerocopter using the link below.
If you are attempting to report spam or abuse, please send an email to: firstname.lastname@example.org
To show our appreciation for our security researchers and community, we offer a monetary bounty for reporting certain qualifying security vulnerabilities to us. Here's how it works:
To qualify for a bounty, you must:
Certain site and product vulnerabilities that are being reported may lead to monetary rewards at’ Carsguide sole discretion.
We only reward the first reporter of a vulnerability. Public disclosure of the vulnerability prior to resolution may cancel a pending reward. We reserve the right to disqualify individuals from the program for disrespectful or disruptive behavior.
We will not negotiate the payout amount in response to duress or threats (e.g. withholding the vulnerability or threat of releasing the vulnerability or any exposed data to the public).
The following security vulnerabilities are NOT eligible for a bounty (and we do not recommend testing for these):