Scope & Rules of Engagement

In-scope — web / API

Asset Notes
corezoid.com Marketing / landing
corezoid.com/api Primary API
superadmin.corezoid.com Operator/superadmin panel
admin.corezoid.com Tenant admin UI (HAR file provided)
account.corezoid.com Auth / SSO / account management
jira.corezoid.com Atlassian Jira instance
openapi.corezoid.com OpenAPI specification host
*.corezoid.com All discovered subdomains (enumerated in recon/subdomains.md)
simulator.company Simulator product root
doc.simulator.company Documentation site
mw.simulator.company Simulator middleware (HAR file provided)
sim.simulator.company Simulator UI / app
vpn.corezoid.com VPN endpoint — fingerprint-only, no auth brute

In-scope — source code

All repositories under github.com/corezoid/ are in scope for cloning, reading, SAST, and secret scanning. Explicitly named:

Out of scope

Testing rules (hard limits)

  1. Non-destructive only. No DROP, no DELETE *, no cache flushes, no mass account creation. Proof-of-concept for writes must use a single tester-controlled record and be cleaned up.
  2. No production data exfiltration. If a vulnerability exposes customer PII, capture the proof (one row, redacted), not the dataset.
  3. Rate limits — CONSERVATIVE mode (CTO directive 2026-04-26). Max 10 req/s per host across all tools. Nuclei: default tags only, no -severity critical -t intrusive, no -tags dos,brute,fuzz. Slow down aggressively if WAF/RL fires.
  4. Auth brute-forcing limited. No password spray. Check weak default credentials (admin:admin, etc.) only against test/staging endpoints that are clearly marked.
  5. PoC depth. For RCE, SSRF, SQLi — prove it with a low-impact canary (read /etc/hostname, resolve a DNS callback, SELECT @@version), not full exploitation.
  6. Log everything. Every request that resulted in a finding lands in evidence/CRZ-NNN-*.
  7. Stop if in doubt. Any ambiguous blast-radius decision → pause and ask the CTO.
  8. Phase-gated execution (CTO directive 2026-04-26). Each of the 9 phases completes with a summary, then pause for CTO confirmation before starting the next phase. Do not run phases back-to-back autonomously.

Authentication material (authorized)

Provided by the CTO at engagement start:

These are live authenticated sessions. Using them to test authenticated endpoints is authorized. Do not share, publish, or commit these files to any remote repository.

Reporting classification

Severity follows CVSS 3.1-ish informal bands: