The platform built because the old one is broken.
No more "Intended Behavior" or unverifiable "Duplicate" claims after a silent patch. Escrow releases automatically the moment a fix is detected — no human can override it.
Transparency protects you. The researchers who go public, file legal demands, and contact journalists are almost never the ones who got a fair explanation. They're the ones who got silence.
Bug bounty platforms are supposed to be neutral. They're not.
HackerOne, Bugcrowd, Intigriti — their customer is the company. The researcher is the product. When a dispute happens, the platform sides with whoever pays the bills.
Researchers get:
This isn't a theory. It's documented. And it's not one researcher — it's the business model.
Companies fund an escrow account through a third-party payment processor before a single report can be submitted. The platform never holds the money. The company never holds the money. Independent escrow, released only on verified resolution. No funds, no program.
Every company joining must submit a registry of known bugs — current, in-progress, acknowledged-but-unpatched — encrypted and hashed. If a company claims duplicate, the duplicate must exist in the registry before the report was submitted. No entry, no duplicate claim. Full stop. If a company patches something matching an open report, escrow releases automatically. If a company claims "intended behavior" and patches it anyway, the researcher gets a defined partial bounty from escrow within a set number of days.
No single triager makes a decision. Three senior researchers assess each report independently with no communication between them. All three agree → automatic resolution. Split decision → all reasoning is published in a visible chat readable by both parties in real time. Either party disagrees → formal mediation with the full transcript as the record. Triagers earn platform standing, not money — no financial incentive to side either way.
Every decision, every piece of reasoning, every timeline event is logged and visible to both parties. Not to the public — to the people involved. No more "we can't share that information." If a duplicate is claimed, the researcher sees the matching registry entry. If a severity is downgraded, the reasoning is written down and signed off by all three triagers. Silence is not an option.
Fast track: Verified high-reputation researchers from HackerOne, Bugcrowd, Intigriti — already vetted, invite directly.
Earned entry: PortSwigger Web Security Academy completion, HackTheBox/TryHackMe progress, documented CTF results. Proof of genuine learning, not just a username. Both tracks require real identity verification — not public, just confirmed.
No decision without a written reason. Every outcome has a documented explanation visible to the affected parties. Always. No exceptions.
No duplicate without proof. Duplicate claims require a registry entry that predates the report. If it's not documented before the report came in, it's not a duplicate.
No escrow discretion. Patch detection and registry matching trigger automatic payment. Humans review grey areas. Humans do not override black and white.