This section outlines the criteria for evaluating vulnerability reports, determining bounty eligibility, and identifying issues that are not eligible for rewards. It also addresses considerations for third-party components and prohibited activities to ensure fair and secure participation.
cat /proc/1/maps
touch /root/<username>
id
, pwd