SusScam Logo

Responsible Disclosure

SusScam encourages global security researchers to probe our infrastructure. If you discover a vulnerability within our Threat Grid or API hooks, follow the protocol below.

Guidelines for Researchers:

  • Do not execute Denial of Service (DDoS) against our primary `/api/reports` ingestion node.
  • Do not extract or attempt to decrypt civilian verification clusters.
  • Provide explicit Proof of Concept (PoC) when submitting isolated zero-days.
// Submit Encrypted Payloads To:security@susscam.com

Verified critical logic bypasses or RCE vectors are eligible for retroactive bounty compensation upon successful verification.