Allowed Research
- Non-destructive testing that does not degrade service.
- Low-volume validation of a suspected vulnerability.
- Findings involving authentication, authorization, data exposure, injection, cryptographic misuse, or configuration weaknesses.