Responsible Disclosure
SusScam encourages global security researchers to probe our infrastructure. If you discover a vulnerability within our Threat Grid or API hooks, follow the protocol below.
Guidelines for Researchers:
- Do not execute Denial of Service (DDoS) against our primary `/api/reports` ingestion node.
- Do not extract or attempt to decrypt civilian verification clusters.
- Provide explicit Proof of Concept (PoC) when submitting isolated zero-days.
// Submit Encrypted Payloads To:security@susscam.com
Verified critical logic bypasses or RCE vectors are eligible for retroactive bounty compensation upon successful verification.
