> attack surface exposed
Probe. Enumerate. Identify weaknesses.
If you discover a valid vulnerability within scope, report it responsibly. We validate, remediate, and compensate based on impact.
Less talk. More payload.
Submit
Report a valid vulnerability.
Scope
In-scope assets & eligibility.
Rewards
Compensation by severity.
Program Status
All submissions are reviewed professionally. Safe harbor applies to good-faith research.