Here you will find answers to questions related to payments, working with us, the work process etc.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
What happens after accepting an acquisition offer from TN Security?
Process
Process
All

We verify the authenticity of the published vulnerability and make you an offer based on current needs and market conditions. It is important to note that unless otherwise stated, all research is purchased by us on exclusive terms, you are not allowed to sell or publish research elsewhere.

How do I submit my zero-day research to TN Security? What is your submission process?
Process
Process
All

It is necessary to write to our mail with filled specification sheet. If we are currently interested in the proposed vulnerability, we will give you a preliminary offer. Then you will need to attach the POC video, as well as additional details: what provoked the vulnerability, what specific conditions are required for exploitation and so on. After agreeing on the amount of the deal, you send us the source code and technical details for verification.

Which payment methods and bonuses are available?
Payout
Payout
All

Payment is possible via international bank transfers, cryptocurrencies, and in some special cases by specific payment means convenient for the resercher.

It is important to remember that some payments are made in several stages to make sure that the exploit remains valid for a certain period of time.

How much can I earn from working with you?
Bounties
Bounties
All

When forming an offer, TN considers many factors. Some of them are:

  • prevalence of vulnerable software
  • required operating conditions
  • need for user interaction
  • execution quality (execution stability, number of vulnerable software versions, presence/absence of ROP chains, etc.)

A rough estimate of various vulnerabilities can be found in the corresponding section.

Are theoretically exploitable bugs (e.g. PoC/crash/trigger only) eligible?
Scope
Scope
All

No. We exclusively obtain vulnerabilities that are confirmed to be exploitable and come with a fully operational exploit compatible with the most recent stable versions of the relevant software, system, or device. Don't hesitate to reach out if you believe your research might meet our criteria.

Are partial exploits (e.g. browser RCE w/o sandbox escape) eligible?
Scope
Scope
All

No, only fully functional exploits and their chains will be considered at this time.

Do you also acquire techniques or mitigation bypass?
Scope
Scope
All

Yes, we are willing to consider any research for purchase, including innovative operating techniques, ways to hide from AV/EDR and the like.
Please email us with any such proposals — submit@tn-sec.com

What if I found a vulnerability and it is not on your scope?
Scope
Scope
All

TN compares favourably with its competitors in terms of the wide range of software and devices for which exploits are purchased. It is very likely that what you are offering will still find a buyer. Send all details to e-mail — submit@tn-sec.com

Which products and/or software are eligible? What is TN Security’s scope?
Scope
Scope
All

See the relevant section at the link.

What are the benefits of reporting a vulnerability to TN Security instead of reporting directly to the vendor?
About Work With Us
About Work With Us
All

We pay a much higher bounty for your research. Often these sums are orders of magnitude higher than what vendor is prepared to offer.

Is TN Security hiring security researchers?
About Work With Us
About Work With Us
All

We frequently recruit vulnerability researchers to become part of our in-house zero-day research team. At TN Security, our researchers engage in advanced vulnerability research and exploit development. They discover zero-day vulnerabilities, produce detailed root-cause analyses, contextualize the vulnerabilities and attack methods, and detect trends in both emerging and established attack surfaces. Explore our careers page to discover job openings in this field.

Who are TN Security’s customers?
About Work With Us
About Work With Us
All

TN's customers are government agencies. We conduct thorough compliance and due-dilligence procedures to ensure that the exploit does not fall into the wrong hands.

How is the acquired security research used by TN Security?
About Work With Us
About Work With Us
All

TN Security conducts comprehensive reviews, testing, and validation of all acquired vulnerability research. Subsequently, this research is tailored, documented, and delivered to institutional clients.

What are the differences between TN Security and other bug bounty programs?
About Work With Us
About Work With Us
All

We buy exploits on a very wide range of software and devices. In most cases, the estimate will be well above what the competition will offer.

Do you have a PGP key?
About Work With Us
About Work With Us
All

Yes, our e-mail address and PGP key are listed in contact section. Our key is also available on the keyserver at pgp.mit.edu

Is TN Security available for custom or contract work?
About Work With Us
About Work With Us
All

Yes, TN is available for contract work, please contact us with a description of the project and we can provide rates.

Why is it legal to work with you?
All

All interactions only take place after both parties have signed the relevant agreements. We are an official legal entity registered in the UK.

How do you protect the privacy and confidentiality of researcher’s information?
Bounties
Bounties
All

Ensuring the privacy of our researchers is a top priority for us. We commit to never sharing any personal information about researchers, including names, aliases, email addresses, banking details, or any other sensitive data, with third parties, including our customers. Additionally, internal access to your information is limited to those who genuinely require it, and your personal data is solely utilized for payment processing purposes.

Can I receive a pre-offer from TN Security before I submit my full research?
Bounties
Bounties
All

Sure! You can receive a preliminary offer for your research without revealing its full details. Just provide us with basic technical information. Upon evaluating this information, if your research aligns with our criteria, we'll send you a preliminary offer. However, the final offer will only be confirmed after we have thoroughly reviewed, assessed, and approved the complete research.

Who can submit exploits in the TN Security?
Bounties
Bounties
All

Any company or individual can submit zero-day research and participate in work with us.

What is a zero-day (0-day) exploit?
General
General
All

A zero-day exploit targets a vulnerability that the vendor hasn't yet started to address, often because they're unaware of the issue. Exodus specializes in discovering these vulnerabilities and crafting exploits to showcase the potential impact of such weaknesses.

How do your capabilities differ from competitor X?
General
General
All

In the variety of software for which exploits are purchased. We are likely to find a buyer for even the most exotic research.

Copy PGP KEY
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=vw7O
-----END PGP PUBLIC KEY BLOCK-----