Process

Yes. To ensure a smooth and efficient evaluation process, we provide a standardised submission template through our Vulnerability Research Hub (VRH).

By using this template, you can:

  • Clearly communicate all required technical details

  • Accelerate the validation, negotiation, and confirmation of your submission

  • Avoid common pitfalls and missing information

 Simply register on the Vulnerability Research Hub (VRH) platform to access the template and begin your submission.

Once your submission has been technically assessed and approved, we will send you a final acquisition offer along with a formal purchase agreement.

By signing the agreement, you confirm the exclusive sale of your research to Crowdfense (unless otherwise negotiated). This includes the full transfer of all related intellectual property rights, meaning the research becomes the sole and exclusive property of Crowdfense.

After the sale:

  • You may not resell, share, publish, or disclose any part of the research

  • You are legally bound to maintain strict confidentiality indefinitely

This ensures the integrity and exclusivity of the capabilities we deliver to our trusted partners.

Submitting your vulnerability research to Crowdfense is a secure and streamlined process designed to protect your work, ensure fair evaluation, and deliver prompt rewards.

All submissions are handled through our Vulnerability Research Hub (VRH), our private, encrypted platform built exclusively for trusted researchers.

Submission Process Overview

01. Enrol on VRH
Sign up on the Vulnerability Research Hub (VRH) to initiate the submission process in a secure and confidential environment.

02. Preliminary Contact
Submit minimal technical details and a video proof-of-concept (PoC) demonstrating the exploit’s capabilities.

03. Technical Evaluation & Negotiation
Crowdfense reviews the submission and gathers further information about the exploit’s features, constraints, and impact.
If aligned with client interest, a preliminary offer is extended to the researcher.

04. Contract Signature
Once the offer is accepted, both parties enter into a formal acquisition agreement, which defines the terms of exclusivity, ownership, and payment.

05. PoC Submission & Acceptance Testing
You provide the full exploit package, including:

  • Source code
  • Technical analysis
  • Root cause explanation
  • Exploitation methodology

Crowdfense then performs a thorough validation and acceptance test.

06. Payment
Upon successful validation, the agreed payment is released using your preferred method (e.g., bank transfer or cryptocurrency).

Yes, and unlike many other platforms, Crowdfense never requires you to disclose your full research, source code, or intellectual property before a formal agreement is in place.

To receive a preliminary offer, simply submit via our secure Vulnerability Research Hub (VRH)

  • Minimal technical specifications

  • A video proof-of-concept (PoC)

These details are sufficient for Crowdfense and our clients to conduct a preliminary evaluation and assess interest.

If your submission meets our criteria, we’ll issue a pre-offer. The complete research package, including source code, documentation, and technical analysis, is only required after both parties sign a formal acquisition contract.

This ensures you maintain complete control of your intellectual property until terms are clearly defined and agreed upon.