Skip to main content

Responsible operations

Guidelines

The discipline of a skilled hunter is not just technical. These guidelines define how responsible operators use RaSEC Hunt.

“The goal is not more reports. The goal is better submissions that hold up in triage.”

Four operating rules

01Scope disciplineOnly test what the program explicitly authorizes
02ReproducibilityIf you cannot reproduce it, do not submit it
03Target stabilityNever hunt a live system without verifying the window
04Coordinated disclosureFollow program timelines. Do not publish early.

The state of AI-assisted bug bounty in 2025-26

HackerOne data shows that 70-82% of bug bounty hunters now use AI tools in some part of their workflow. At the same time, "AI slop" — unvalidated, shallow, AI-generated reports — has become one of the top complaints from program triage teams. Curl shut its entire public bug bounty program because of it.

This is the central tension: AI tooling is already being used at scale, but the majority of AI-assisted output is not meeting the standard that programs require. The hunters who benefit from AI tooling are those who apply the same discipline to AI output that they would to their own manual work.

RaSEC Hunt enforces scope constraints and validation requirements at the system level. But the platform cannot enforce judgment on your behalf at submission time. You decide whether the evidence is sufficient. You decide whether the scope was clearly confirmed. You decide whether the timing is right for disclosure.

These guidelines describe what responsible judgment looks like in practice — not as abstract principles, but as specific dos and don'ts grounded in what triage teams and program operators actually see in submissions.

How responsible hunters operate

01

Scope discipline

Only test what the program explicitly authorizes

Operate only within the approved in-scope assets, URL patterns, and authorized testing windows defined by the program. Scope violations — even accidental ones — can result in program bans, legal exposure, and damage to the broader security research community.

DO

  • Import scope from the program's official HackerOne or Bugcrowd scope definition
  • Verify wildcard scope coverage before starting any subdomain recon
  • Re-confirm scope on every new hunt session in case it has changed
  • Stop immediately and flag if the agent reaches an asset not clearly in scope

DO NOT

  • Do not assume a subdomain is in scope because the parent domain is
  • Do not test assets that are in scope for another program you are not registered for
  • Do not modify the scope policy mid-session to expand coverage without proper review
02

Reproducibility

If you cannot reproduce it, do not submit it

Triage teams hold AI-assisted submissions to the same standard as manual reports — sometimes higher, because reviewers are increasingly skeptical of AI-generated output. A finding without a working reproduction path is not a finding. The ValidationAgent enforces this before you see output, but you are responsible for reviewing the evidence chain before submission.

DO

  • Review the full HTTP evidence bundle (request, response, diff) before every submission
  • Verify the curl command runs successfully against the live target before submitting
  • Confirm the reproduction still works at submission time, not just at detection time
  • Include your test environment details if they affect reproducibility

DO NOT

  • Do not submit a PENDING finding — wait for CONFIRMED status
  • Do not submit without verifying the target has not been patched since detection
  • Do not clean up evidence artifacts before submission — include the full chain
03

Target stability

Never disrupt the target application

Bug bounty testing must not create lasting impact on the target system. Denial-of-service patterns, destructive write operations, user data exposure beyond what is required to demonstrate impact, and any action that affects the target's other users are not acceptable — regardless of whether they are within scope.

DO

  • Use test accounts created for bounty testing, not real user accounts
  • Rate-limit hunt intensity if you notice response degradation on the target
  • Use the pause control to stop the hunt if unexpected side effects appear
  • Report unintended disruption to the program immediately, even if in scope

DO NOT

  • Do not attempt DoS or load testing of any kind
  • Do not exfiltrate real user data beyond what is needed to demonstrate the finding
  • Do not modify or delete production data outside a controlled test environment
04

Coordinated disclosure

Work with the program, not against it

Responsible disclosure means giving the organization time to fix the issue before it becomes public. Most programs specify their disclosure policy — typically 90 days for critical findings. Follow the program timeline. If you disagree with a triage decision, escalate through the platform's appeal process, not by going public.

DO

  • Follow the program's stated disclosure timeline precisely
  • Communicate clearly with the triage team if you need clarification
  • Use the program's official submission channel — not social media DMs
  • Give the organization time to patch before posting any public writeup

DO NOT

  • Do not publish a writeup before the program confirms the fix is deployed
  • Do not contact the company directly outside the bounty platform unless instructed
  • Do not threaten public disclosure to pressure faster triage decisions

Red lines that are never acceptable

These actions are grounds for immediate session termination, program ban, and in some jurisdictions, legal liability.

  • Testing production systems without authorization — even to demonstrate impact
  • Running denial-of-service or brute force attacks outside explicit approval
  • Accessing real user data beyond what is necessary to demonstrate the vulnerability
  • Modifying or deleting data in production systems
  • Publicly disclosing a finding before the program has had time to patch
  • Sharing unpatched vulnerability details with third parties

Legal note: These guidelines do not constitute legal advice. Authorization requirements, disclosure obligations, and safe-harbor provisions vary by program, jurisdiction, and context. Always verify your legal position before conducting any security testing, especially on targets outside your home country.