How do I submit my zero-day research to Crowdfense? What is the submission process?

Submitting your vulnerability research to Crowdfense is a secure and streamlined process designed to protect your work, ensure fair evaluation, and deliver prompt rewards.

All submissions are handled through our Vulnerability Research Hub (VRH), our private, encrypted platform built exclusively for trusted researchers.

Submission Process Overview

01. Enrol on VRH
Sign up on the Vulnerability Research Hub (VRH) to initiate the submission process in a secure and confidential environment.

02. Preliminary Contact
Submit minimal technical details and a video proof-of-concept (PoC) demonstrating the exploit’s capabilities.

03. Technical Evaluation & Negotiation
Crowdfense reviews the submission and gathers further information about the exploit’s features, constraints, and impact.
If aligned with client interest, a preliminary offer is extended to the researcher.

04. Contract Signature
Once the offer is accepted, both parties enter into a formal acquisition agreement, which defines the terms of exclusivity, ownership, and payment.

05. PoC Submission & Acceptance Testing
You provide the full exploit package, including:

  • Source code
  • Technical analysis
  • Root cause explanation
  • Exploitation methodology

Crowdfense then performs a thorough validation and acceptance test.

06. Payment
Upon successful validation, the agreed payment is released using your preferred method (e.g., bank transfer or cryptocurrency).