Security Policy & Unauthorized Access

Zero-tolerance policy for hacking attempts, unauthorized access, and malicious security testing

CRITICAL LEGAL NOTICE

Unauthorized access to computer systems, networks, or data is a FEDERAL CRIME punishable by severe legal penalties including fines and imprisonment under the Computer Fraud and Abuse Act (CFAA) and equivalent international laws.

Not a Testing Ground

This website and its underlying infrastructure are NOT platforms for testing hacking skills, conducting security research, or attempting to exploit vulnerabilities. BentBox maintains enterprise-grade security measures to protect our systems, data, and users.

Any attempt to bypass, circumvent, or compromise our security measures will be treated as a serious criminal incident and will be immediately reported to law enforcement authorities with full cooperation in any resulting investigation and prosecution.

Strictly Prohibited Activities

The following activities are expressly prohibited and constitute illegal unauthorized access:

  • Attempting to gain unauthorized access to any part of this website, its systems, databases, or underlying infrastructure
  • Conducting penetration testing, vulnerability scanning, security assessments, or any form of security testing without explicit written authorization
  • Distributing, using, or deploying any tools, scripts, malware, or techniques designed to compromise system security
  • Attempting to disrupt, interfere with, or degrade the operation of this website or any of its services
  • Attempting to access, steal, modify, delete, or corrupt any data stored on or transmitted through our systems
  • SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), or any other attack techniques
  • Brute force attacks on authentication systems, password cracking, or credential stuffing
  • Denial of service (DoS) or distributed denial of service (DDoS) attacks
  • Network scanning, port scanning, or reconnaissance activities
  • Social engineering attacks targeting BentBox employees, contractors, or users
  • Exploiting vulnerabilities in third-party services or APIs integrated with our platform
  • Reverse engineering, decompiling, or disassembling any software or code

NO BOUNTY PROGRAM EXISTS

BentBox does NOT operate any form of bug bounty, vulnerability reward, or security research incentive program. Under NO circumstances will any compensation be provided for security research activities.

  • No financial rewards, Bitcoin, cryptocurrency, or payments of any kind will be issued
  • We will not entertain demands, ransom requests, or extortion attempts for vulnerability information
  • Unsolicited vulnerability reports are received WITHOUT any obligation or expectation of payment
  • Any attempts to extort or blackmail BentBox will be immediately reported to law enforcement

Law Enforcement Cooperation

BentBox maintains strong relationships with cybercrime authorities and will not hesitate to report unauthorized access attempts. We actively cooperate with:

  • Netherlands National High Tech Crime Unit (NHTCU) - Primary cybercrime authority (government.nl/topics/cybercrime)
  • Europol European Cybercrime Centre (EC3) - International cybercrime coordination
  • FBI Internet Crime Complaint Center (IC3) - US cybercrime reporting
  • Interpol - Global law enforcement coordination
  • Local law enforcement - Based on attacker's jurisdiction

We maintain comprehensive logs including IP addresses, timestamps, user agents, session data, and attack patterns. All evidence will be preserved and provided to authorities for investigation and prosecution.

Responsible Vulnerability Disclosure

While we do not operate a bounty program and prohibit unauthorized security testing, we recognize that legitimate security researchers may occasionally discover potential vulnerabilities through normal use.

If you believe you have discovered a genuine security vulnerability during authorized use of our platform:

  • Do NOT exploit, test, or attempt to verify the vulnerability
  • Do NOT access, modify, or delete any data
  • Do NOT disclose the issue publicly or to third parties
  • Report it privately and responsibly via email

Contact our security team at:

We appreciate responsible disclosure but remind you that no payment or reward will be provided. All reports are voluntary and received without obligation.

Legal Consequences

Unauthorized access to computer systems is illegal under multiple jurisdictions and legal frameworks:

  • Computer Fraud and Abuse Act (CFAA) - United States federal law (18 U.S.C. § 1030)
  • Computer Misuse Act - United Kingdom
  • EU Directive on Attacks Against Information Systems - European Union
  • Dutch Computer Crime Act - Netherlands (Wet computercriminaliteit)
  • Budapest Convention on Cybercrime - International treaty

Penalties may include substantial fines, imprisonment, criminal records, civil liability for damages, and permanent bans from technology platforms.

By accessing and using this website, you acknowledge and agree to abide by this security policy. Any violation may result in immediate account termination, legal action, and criminal prosecution. BentBox reserves all legal rights and remedies available under applicable law.

FINAL WARNING

We take security seriously. We prosecute attackers. We cooperate fully with law enforcement. Do not test our systems. Do not attempt unauthorized access. The consequences are severe.

Top