← Back to Home

We Want to Hear From You

If you've discovered exposed government infrastructure, APIs, or data that you believe warrants investigation, we want to know about it. Your tips help us identify new research targets and expand our coverage.

What We're Looking For

Secure Contact Methods

We take source protection seriously. Use these methods for sensitive communications:

Source Protection

We protect our sources. We will never reveal your identity without your explicit consent. If you need to communicate anonymously, we recommend using Tor and our secure contact methods.

What Happens Next

After receiving your tip, our research team will evaluate it and determine if it falls within our research scope. We'll contact you (if you've provided contact information) with any follow-up questions. If we proceed with an investigation, we'll keep you informed of our progress as appropriate.