Free Pentest Candidate Intake

Earn your
free attack
surface review.

A fun, high-signal way to see whether your environment qualifies for a free Syn Eater pentest slot.

Tell us what you want tested, what is exposed, and why it matters. We will review the application, confirm authorization boundaries, and choose suitable candidates based on impact, readiness, and fit.

01. ApplyShare scope, business context, and security goals.
02. QualifyWe check fit, authorization, and technical readiness.
03. ScopeAgree safe boundaries, test windows, and contacts.
04. Get TestedReceive practical findings and next-step guidance.
A
What makes a strong application?

A clear asset owner, defined scope, written authorization, and a business reason for testing.

B
What should not be submitted?

No passwords, secrets, private keys, sensitive personal data, or production credentials in this form.

Free Pentest Application

Complete the secure intake below. Required fields help us confirm ownership, scope, and safe testing boundaries before any technical activity.

Secure Intake
Security note

This form is designed for intake only. Do not include passwords, API keys, bearer tokens, SSH keys, confidential datasets, or personal information beyond the contact details required for the application.

01 Applicant and organization
Please enter your full name.
Please enter a valid work email.
Please enter your role.
Please enter the company name.
Please enter a valid website URL.
Please enter your country or region.
Please select an industry.
02 What should we test?
Choose one or more. We will help narrow the scope if your application is selected.
Please provide target assets or a proposed scope.Only include assets you own or are authorized to test.
Please select an environment type.
Please provide business context.
03 Readiness and risk context
Please select preferred timing.
04 Authorization and consent
Please identify the authorized asset owner.
Please provide the approval decision maker.

Selection Criteria

  • Clear authorization and asset ownership
  • Defined scope that can be tested safely
  • Meaningful business or community impact
  • Responsive technical contact for coordination

What Happens Next

Applications are reviewed for suitability. If selected, Syn Eater will schedule a scoping call, confirm written authorization, agree testing boundaries, and define what evidence and reporting will be provided.

Safety Rules

No testing starts from this form alone. Testing requires explicit written authorization, agreed scope, contact points, safe windows, and non-destructive rules of engagement.