Step 1: Terms & Conditions
This onboarding process collects the information needed to map your organization’s external attack surface and digital footprint, enabling the creation of a tailored vulnerability intake form and vulnerability disclosure policy, and initiating a vulnerability disclosure program for your organization.
By continuing, you confirm that you are authorized to represent your company in this onboarding process and that the information you provide is accurate.
During verification, we validate company ownership, domain control, and submitted contact details.
Verification typically takes 1-3 business days.
To proceed, you must review and accept our Terms and Conditions and acknowledge the onboarding process described above.