At WePwn, we pride ourselves on delivering unparalleled expertise, cutting-edge technology, and personalized service to our clients.
Agreement to Terms
By accessing and using WePwn services, you agree to be bound by these Terms of Service and all applicable laws and regulations.
Services Description
• Vulnerability Disclosure Program
• Managed Vulnerability Disclosure Program
• Pentest as a Service
• Security Consulting Services
Use License
Permission is granted to temporarily access our services for personal or business use, subject to these Terms of Service.
Disclaimer
Our services are provided "as is". WePwn makes no warranties, expressed or implied, regarding the services provided.
Limitations
In no event shall WePwn be liable for any damages arising out of the use or inability to use our services.
Contact Information
For any questions about these Terms of Service, please contact us through our official channels.
Security Requirements
Researchers must follow responsible disclosure practices. Do not exploit vulnerabilities beyond what is necessary to demonstrate the issue. Do not access, modify, or delete data that does not belong to you. All testing must be conducted within the defined scope.
Confidentiality
All information about vulnerabilities discovered must be kept confidential until authorized for disclosure. Do not share details about vulnerabilities with third parties without explicit permission. Researchers agree to destroy all data collected during testing once the engagement is complete.
Program Rules
Researchers must stay within the defined scope of the program. Testing methods that could impact system availability or data integrity are prohibited unless explicitly authorized. Automated scanning tools must be used responsibly to avoid system degradation.
Legal Protection
Researchers who comply with these terms will receive legal safe harbor for their security research activities. This protection is limited to activities that conform to these guidelines. Any activities outside the scope or in violation of these terms are not protected.
Researcher Support
We provide support for researchers through dedicated channels. Questions about scope, testing methods, or report submissions can be directed to our researcher support team. We aim to respond to all inquiries within 24 business hours.
Submission Process
All vulnerability reports must be submitted through the researcher portal. Reports should include clear steps to reproduce, potential impact, and any relevant screenshots or proof of concept code. For critical vulnerabilities, please use the emergency contact method provided in the portal.