If a client repeatedly requests informal expansions to scope and refuses to formalize them in writing, we end the engagement at the next natural break. Pre-billed work is delivered; future phases are not booked.
Rules of Engagement
How we work, what we commit to, and where we walk away. This document is referenced in every Statement of Work — read it before we sign anything together.
NDA before scope. Written authorization before testing. Daily updates during engagements. Findings communicated as discovered, not held for the final report. Materials deleted 30 days after close. Critical issues outside agreed scope get coordinated disclosure to the affected vendor, never sold or leveraged. If any of this is incompatible with how you need to work, tell us before we sign.
Scope is defined by inclusion, not exclusion.
The Statement of Work names every asset, endpoint, and system class included in testing. Anything not named is out of scope by default — there is no ‘we’ll assume it’s fine to test.’ Out-of-scope discoveries are reported, not exploited.
Engagement type determines depth.
Pre-launch audits, continuous red-team retainers, and incident response engagements have different depths of testing. Each is documented separately in the SOW with explicit techniques and intensity allowed.
Scope changes require written amendment.
If something we discover suggests broader testing is warranted, we stop, document the finding, and request a scope amendment. We do not act on ‘we should probably also check…’ impulses without paperwork.
Time-box, not scope-box.
Engagements have fixed time windows. If scope expands inside the time-box, we negotiate either an extension or a deferral — never silent overrun.
Encryption in transit and at rest.
All engagement materials (sample data, system prompts, configurations, findings) are transmitted via encrypted channels and stored encrypted at rest on infrastructure under our direct control. No client data crosses our systems unencrypted.
Access on a need-to-have basis.
Engagement materials are accessible only to the named practitioners assigned to your engagement. We do not pool data across engagements. We do not use client data to improve internal tooling without explicit written consent.
30-day retention default.
All engagement materials are deleted 30 days after engagement close, by default. Extended retention is available on written request and documented in the SOW. Retention applies to source materials, findings drafts, and working data — final reports may be retained at the client’s direction.
No client data in our AI tooling.
Client data, system prompts, and engagement materials are never submitted to third-party LLM providers. Where AI tooling is used during engagements, it runs on infrastructure under our control with explicit client consent documented in the SOW. We do not train models on client data.
Access revocation on close.
Credentials, VPN access, system accounts, and any other access provisioned for the engagement is revoked within 4 hours of engagement close. We provide a written confirmation of revocation as part of engagement closure.
Daily async updates during active engagements.
Each engagement day produces a written async update by 18:00 in the client’s timezone: work performed, findings discovered, next-day plan. No silent days.
Findings communicated as discovered, not held.
Findings of severity HIGH or above are communicated within 24 hours of discovery, regardless of where we are in the engagement. We do not hold critical findings for the final report. For CRITICAL findings, within 4 hours.
Out-of-band channel for critical issues.
Every engagement designates an out-of-band communication channel (Signal, encrypted email, or equivalent) for findings that cannot wait for normal channels. This channel is verified during engagement setup, not improvised during a crisis.
Named primary contact, named backup.
Every engagement has a named primary client contact and a named backup. We do not route findings through general inboxes or shared aliases. Changes to contact assignment require written notice.
Engagement findings stay confidential.
Findings from a paid engagement are confidential to that client and remain so indefinitely unless the client explicitly consents to publication.
Sanitized publication only with consent.
Where we wish to publish anonymized case studies from real engagements, we strip all client identifiers, modify non-essential technical details, and obtain written client approval before publication. No finding is published without explicit consent.
Third-party vulnerabilities trigger coordinated disclosure.
If during an engagement we discover a vulnerability in a third-party product (vendor, library, framework) that affects more than just our client, we initiate coordinated disclosure with that vendor — never sold, never leveraged, never weaponized. Default window is 120 days. See /legal for the full disclosure policy.
We do not sell or leverage findings.
Findings discovered on paid engagements are not used as leverage in business development, marketing collateral, or sales conversations with other prospects. They do not appear in pitch decks. They are not ‘aged out’ into reusable content.
Active competitor conflicts.
We do not run concurrent engagements for direct competitors in the same product category. If we are engaged with one party, we will not accept an engagement from their direct competitor for the duration of the engagement plus 90 days.
Vendor conflicts.
If we have any financial relationship with a vendor whose product is in scope for an engagement, we disclose it in writing before the SOW is signed. Material conflicts (equity, paid advisorship) disqualify us from testing that vendor.
Personal conflicts.
Investigators with personal relationships to client staff (family, current or former romantic partners, close personal friends) recuse from those engagements. Recusal does not affect the firm’s ability to take the engagement with different staff.
Ongoing disclosure.
Conflicts that surface mid-engagement are disclosed in writing within 24 hours of becoming known. The client decides whether the engagement continues.
If we discover that authorization for any in-scope asset is unclear, incomplete, or contested, we pause testing immediately and require written resolution before resuming. Unresolved after 5 business days, we terminate.
If continuing the engagement would expose us to legal liability beyond what’s documented in the SOW (regulatory issues surfacing mid-work, third-party rights uncovered, etc.), we pause and require resolution. Material unresolved exposure terminates the engagement.
If our work, even within authorized scope, would cause material harm to identifiable third parties (customers, downstream users, uninvolved vendors), we stop and renegotiate or terminate. Adversarial testing is not a license for collateral damage.
If we are asked to use engagement work for purposes outside defensive security — leverage, sales intelligence, harm to competitors, surveillance — we refuse and end the relationship.
If the client breaches the engagement NDA or violates the ethical commitments we’ve agreed to, we terminate immediately and may seek legal remedy.
< 24 hours
< 48 hours from request
< 5 business days after NDA
2 weeks
18:00 client timezone
< 4 hours notification
< 24 hours notification
< 5 business days after closure
< 4 hours after close
30 days default
< 2 business days
2 minimum
These commitments apply to standard engagements. Incident response and retainer engagements have amended timelines documented in their respective SOWs.
This document is referenced in every Statement of Work and governs the conduct of every engagement. Where this document conflicts with a signed Statement of Work, the SOW takes precedence — these are defaults, the SOW is the contract. For broader engagement legal terms, see /legal. For data-handling practices that apply beyond engagements, see /privacy.
We track substantive changes to this document below. Minor edits are not logged.