Submission Process

Submitting you research
To submit your research please send an encrypted email to ssd(at)beyondsecurity[dot]com

Submission process

  • You send us a brief description of the vulnerability
  • We may follow up with questions
  • We sign a contract
  • You send us the vulnerability
  • Our technical team verifies the vulnerability
  • We contact the vendor
  • You get paid
  • The vulnerability is responsibly disclosed and published

For more information about the project, see:

Encryption Key
You can encrypt your reports/submissions using this public key (for noamr[at]beyondsecurity[dot]com):