As part of the kCTF VRP rules, security researchers need to submit the secret flag as proof of successful exploitation. Researchers don't need to share the details of their exploit before the vulnerabilities are fixed but will need to do so at a later stage to be eligible for the VRP rewards.
Sign in to Google to save your progress. Learn more
Email *
Flag *
Please provide the flag you've found!
Hash checksum of exploit
Please make sure to keep a BACKUP of your file(s). Use a sha256 or similar.
A copy of your responses will be emailed to the address you provided.
Clear form
Never submit passwords through Google Forms.
This form was created inside of Google.com. Privacy & Terms