Norway-based sole proprietorship

Theodor N. Engøy

Authorized vulnerability research, defensive security testing, and evidence-focused responsible reporting.

Business identity

Independent security research business

Legal name Theodor N. Engøy
Business form Sole proprietorship in Norway
Website theodornengoy.com
Operating focus Authorized security research

Work focus

What I use advanced security tools for

  • Reproducing and documenting vulnerabilities in authorized bug bounty programs.
  • Reviewing code for trust-boundary, authorization, sandbox, and agent-tooling issues.
  • Preparing concise proof-of-concept evidence for responsible disclosure.
  • Defensive analysis of systems I own or have explicit permission to assess.

Scope discipline

Authorization-first by default

I only perform security testing on systems I own or systems where I have explicit authorization through a program, client scope, or written permission.

My goal is practical defensive value: clear reproduction, minimal safe proof, and responsible handoff to the affected owner.

Responsible research policy

How I handle vulnerability research

Allowed work

Authorized testing, defensive code review, local proof-of-concept development, and vulnerability report preparation.

Evidence standard

Reports should be reproducible from a clean state, include clear impact, and avoid speculative or inflated claims.

Safety limits

I avoid destructive testing, persistence, data exfiltration, credential harvesting, social engineering, and noisy scanning unless a program explicitly authorizes the activity.

Disclosure

I follow platform and program disclosure rules and do not publish vulnerability details without permission from the affected party.

Trusted access context

Why I request cyber-capable model access

I use AI systems to support legitimate security research: reading code, comparing behavior to security boundaries, drafting safer reproduction steps, and tightening evidence before submitting to authorized programs or clients.

This access is not used for unauthorized intrusion, credential theft, malware deployment, or activity outside applicable program rules and terms of service.

Contact

Security research contact

For platform reviews or authorized research inquiries, use the contact details provided in the relevant access request, bug bounty platform, or client channel.

Email Theodor