HyveGuard

Rules & safe harbour

Read this before you do anything. If you stay within the lines, we will treat you as an authorised researcher. If you go outside the lines, we cannot.

In scope

Out of scope

Out-of-scope activity is not authorised under this policy, voids your safe harbour, and may be reported to the relevant provider.

Safe harbour

If you make a good-faith effort to comply with this policy:

  1. We will not initiate or recommend legal action against you for your research.
  2. We will not pursue a complaint with your educational institution or employer.
  3. We will not seek a complaint under the UK Computer Misuse Act 1990 (or any local equivalent) for activity within the scope above.
  4. We will treat you as an authorised researcher.
  5. If a third party initiates legal action against you for in-scope research, we will publicly state that your activity was authorised under this policy.

Tier rules — Heimdall's trials

  1. Draugr — Barrow-breach
    Submit a planted flag from any single node. The flag is a file on disk — find it, read it, submit the value. Timestamps must be consistent with your reported access window.
  2. Berserker — Hall-breaker
    Submit a flag from a PostgreSQL row on any node. We've planted them behind real application stacks; they rotate location each season.
  3. Skald — Bridge-walker
    Submit flags from ≥2 distinct nodes, with proof of pivot path (DAG entries, traffic timing, or equivalent evidence that you moved between realms).
  4. Seiðr — Rune-forger
    A valid Ed25519 threshold signature against today's canonical challenge bytes under the cluster's group_pub. Verifier runs ed25519.Verify(group_pub, canonical, sig). The Gjallarhorn sounds. Bifrost shatters. Season ends.
  5. Einherjar — The Unseen
    Achieve Seiðr with zero canary trips, zero Merkle drift, zero alerts throughout the entire approach. Confirmed via clean audit DAG at season end. Heimdall never tells you what he saw — you may genuinely never know whether a canary fired.

Tripping a canary, a honey port, or a DNS sentinel does not banish you. It silently records that Einherjar is no longer in play this season.

Reporting

All tier captures (Draugr / Berserker / Skald flag strings and the Seiðr signature) go through the single form on the landing page. The cluster auto-detects the format, verifies in constant time against the on-box hashed vault (Draugr–Skald) or runs ed25519.Verify against today's canonical bytes (Seiðr), and credits the supplied handle. Einherjar is auto-derived at season end if the audit DAG is clean. No email channel for tier captures.

CVE-style vulnerability disclosure (a code-level bug that warrants out-of-band coordination, redaction, or coordinated release): PGP-encrypted email to [email protected] (key). Acknowledgement within 72 hours. Triage within 7 days. Resolution depends on severity; we aim for ≤30 days for confirmed vulnerabilities.

For a vulnerability disclosure, include:

Recognition

No monetary bounty at launch. May be revisited at the 60-day mark of any season if engagement justifies it.

Out-of-scope reports

If you find something interesting that's out of scope (e.g. a vulnerability in one of the upstream providers), we'll forward it to the right party with credit to you, but we have no authority to grant safe harbour outside this policy.

Upstream-provider status

The four edge boxes are hosted on OVH (France), Netcup (Germany), DigitalOcean (Singapore), and Vultr (Japan). We have checked each provider's AUP against the challenge's activity profile and notified them before launch:

This is why the out-of-scope list above is what it is. Staying inside it keeps us — and your research — inside the four separate contracts we hold with these providers.

Versioning

This policy version: v1.1. Last updated: .