> attack surface exposed

Probe. Enumerate. Identify weaknesses.

If you discover a valid vulnerability within scope, report it responsibly. We validate, remediate, and compensate based on impact.

Less talk. More payload.

Submit

Report a valid vulnerability.

Scope

In-scope assets & eligibility.

Rewards

Compensation by severity.

Responsible Disclosure Policy → Hall of Fame → Public Reports →

Program Status

All submissions are reviewed professionally. Safe harbor applies to good-faith research.