We are excited to announce that the Exodus Intelligence Program is now accepting submissions!
The EIP was designed by those with a long history both discovering vulnerabilities as well as procuring them through various acquisition programs. Our collective experience has allowed us to architect the EIP such that it is appealing to those who have the skill and desire to receive compensation for their research.
All vulnerabilities purchased through the EIP will be disclosed to the affected vendor(s) for remediation.
Some of the benefits for researchers participating in the EIP include a 10 business day decision timeline, starting when a submission is first received. We also intend to maintain a highly transparent program whereby our analysts are reachable by the contributing researchers for any questions. For those submissions we do procure, we will provide the researcher who sent it in with our internal analysis as to the root cause and exploitability because we believe it is essential to give back to and aid our researchers in their pursuit of knowledge.
As Exodus Intelligence does not support any products of our own, we are interested not only in code execution issues, but also vulnerabilities that other acquisition programs may not be (local vulnerabilities, memory disclosures, techniques).
One of the main focuses of Exodus is to provide information to our customers on vulnerabilities we believe are not only exploitable, but likely to be exploited. While this means we may be turning down submissions that are simply theoretically exploitable, it also means we are able to better compensate researchers for the work we are interested in.
There is a FAQ available on the EIP website, but if you have any specific questions feel free to e-mail us at firstname.lastname@example.org (PGP).
For more generic questions or press inquiries, please use email@example.com (PGP).
Posted by: Aaron Portnoy, Zef Cekaj, Logan Brown, Brandon Edwards