Skip to main content

Direct line

Contact

We route by topic. Pick the path that matches your situation below.

Response expectations

24hEarly accessWe reply within 24 hours
48hPartnershipReviewed within 48 hours
48hSecurity reportsTriaged within 48 hours
5dGeneralWithin 5 business days

Pick the right path

Early access

Join the active cohort

Early access means you use the platform in its current development state and provide direct feedback on what matters most for your workflow. You get access to capabilities before they are public and influence what the next milestone prioritizes.

Fastest path: create an account and start on Free tier. Cohort invitations for Pro/Elite are issued based on usage and feedback from the workspace.

Partnerships

Program operators, consultancies, AppSec teams

If you run a bug bounty program and want cleaner submissions from hunters using RaSEC Hunt, or if you are a consultancy wanting to trial overnight agentic hunts on client engagements, or an AppSec team wanting to integrate into your SDLC — start with the partners page to understand which model fits your situation.

Contact is through the workspace channel after you have reviewed the partner models on the Partners page. Include your organization type and what you are trying to achieve.

Security reports

Platform vulnerabilities, not target bugs

For vulnerabilities in the RaSEC Hunt platform itself — not findings from a hunt on a third-party target, but actual bugs in our own application — we follow coordinated disclosure. We respond to verified reports within 5 business days and aim to patch critical findings within 30 days.

Subject line: "Security: [brief description]". Include reproduction steps, environment, and evidence. Do not scan our infrastructure without written consent.

General questions

Platform and workflow questions

Many common questions are answered in the FAQ. If your question is not there, sign in and use the workspace to ask directly. We monitor the workspace actively and route questions to the appropriate team.

For pre-account questions, use the contact form in the workspace sign-in flow.

What to expect after reaching out

We publish these response expectations because we believe in honesty over "we will get back to you shortly."

TopicExpected timelineHow it is handled
Critical security vulnerability5 business days acknowledgementImmediate triage
Partnership inquiry3-5 business daysDirect conversation
Early access requestCohort-based, not first-come-first-servedUsage-based invitation
General platform questionFAQ first, then workspaceAsync workspace channel

High-signal contact only

We do not have a public email address or a contact form that accepts everything. Contact channels are shared during onboarding and partner outreach to keep communications high-signal and secure. The fastest path for most situations is signing in to the workspace.

If you are a journalist, researcher, or academic studying AI-assisted security testing, press and research inquiries are routed through the workspace after account creation.

We do not respond to: cold sales pitches for third-party tools, unsolicited SEO proposals, "AI content" offers, partnership requests that do not reference a specific model on the Partners page, or scope expansion requests submitted outside the official program process.

We do respond to: genuine early access questions, verified vulnerability reports, partnership discussions that start with a specific and honest description of what you are trying to achieve.