Blankline Security invites researchers to identify vulnerabilities in our infrastructure. We operate a "Safe Harbor" program: researchers acting in good faith and adhering to this policy are authorized to test our systems and will not face legal action.
Safe Harbor Status: Authorization is granted to access data only for the purpose of demonstrating a vulnerability. Do not exfiltrate data.
The following assets are explicitly in-scope for this program. Any asset not listed here is out of scope.
As a research institute, we currently prioritize infrastructure integrity over monetary compensation. However, we believe in honoring those who help secure the frontier. Successful submissions are rewarded with public attribution and reputation verification.
Examples: RCE, SQLi, Authentication Bypass, Model Weight Exfiltration.
Examples: IDOR, Stored XSS, Privilege Escalation.
Do not destroy data. If you encounter PII, stop immediately and report the finding. Do not dump the database.
No Social Engineering. Attacks targeting Blankline employees (phishing, vishing) are strictly out of scope.
Automated Scans. High-volume automated scanning is prohibited on production endpoints. Use the staging environment.
For critical vulnerabilities, encrypt your report using our PGP key. Reports containing PII must be encrypted.