We route by topic. Pick the path that matches your situation below.
Response expectations
24hEarly access — We reply within 24 hours
48hPartnership — Reviewed within 48 hours
48hSecurity reports — Triaged within 48 hours
5dGeneral — Within 5 business days
What brings you here?
Pick the right path
Early access
Join the active cohort
Early access means you use the platform in its current development state and provide direct feedback on what matters most for your workflow. You get access to capabilities before they are public and influence what the next milestone prioritizes.
Fastest path: create an account and start on Free tier. Cohort invitations for Pro/Elite are issued based on usage and feedback from the workspace.
If you run a bug bounty program and want cleaner submissions from hunters using RaSEC Hunt, or if you are a consultancy wanting to trial overnight agentic hunts on client engagements, or an AppSec team wanting to integrate into your SDLC — start with the partners page to understand which model fits your situation.
Contact is through the workspace channel after you have reviewed the partner models on the Partners page. Include your organization type and what you are trying to achieve.
For vulnerabilities in the RaSEC Hunt platform itself — not findings from a hunt on a third-party target, but actual bugs in our own application — we follow coordinated disclosure. We respond to verified reports within 5 business days and aim to patch critical findings within 30 days.
Subject line: "Security: [brief description]". Include reproduction steps, environment, and evidence. Do not scan our infrastructure without written consent.
Many common questions are answered in the FAQ. If your question is not there, sign in and use the workspace to ask directly. We monitor the workspace actively and route questions to the appropriate team.
For pre-account questions, use the contact form in the workspace sign-in flow.
We publish these response expectations because we believe in honesty over "we will get back to you shortly."
Topic
Expected timeline
How it is handled
Critical security vulnerability
5 business days acknowledgement
Immediate triage
Partnership inquiry
3-5 business days
Direct conversation
Early access request
Cohort-based, not first-come-first-served
Usage-based invitation
General platform question
FAQ first, then workspace
Async workspace channel
Contact quality
High-signal contact only
We do not have a public email address or a contact form that accepts everything. Contact channels are shared during onboarding and partner outreach to keep communications high-signal and secure. The fastest path for most situations is signing in to the workspace.
If you are a journalist, researcher, or academic studying AI-assisted security testing, press and research inquiries are routed through the workspace after account creation.
We do not respond to: cold sales pitches for third-party tools, unsolicited SEO proposals, "AI content" offers, partnership requests that do not reference a specific model on the Partners page, or scope expansion requests submitted outside the official program process.
We do respond to: genuine early access questions, verified vulnerability reports, partnership discussions that start with a specific and honest description of what you are trying to achieve.