Selection Criteria
- Clear authorization and asset ownership
- Defined scope that can be tested safely
- Meaningful business or community impact
- Responsive technical contact for coordination
A fun, high-signal way to see whether your environment qualifies for a free Syn Eater pentest slot.
Tell us what you want tested, what is exposed, and why it matters. We will review the application, confirm authorization boundaries, and choose suitable candidates based on impact, readiness, and fit.
A clear asset owner, defined scope, written authorization, and a business reason for testing.
No passwords, secrets, private keys, sensitive personal data, or production credentials in this form.
Applications are reviewed for suitability. If selected, Syn Eater will schedule a scoping call, confirm written authorization, agree testing boundaries, and define what evidence and reporting will be provided.
No testing starts from this form alone. Testing requires explicit written authorization, agreed scope, contact points, safe windows, and non-destructive rules of engagement.