OPSEC & Legal
⚠️ The Golden Rule
Authorization Checklist
## Pre-Scan Authorization Checklist
### Legal Authorization
- [ ] Written permission from asset owner (email, contract, or bug bounty policy)
- [ ] Scope document clearly defines in-scope assets
- [ ] Out-of-scope assets are documented and excluded
- [ ] Testing window defined (if applicable)
- [ ] Rate limits agreed upon (if any)
### Technical Preparation
- [ ] Scope file created (`-i inscope.txt`)
- [ ] Exclusions configured (`-x outofscope.txt`)
- [ ] Rate limits set appropriately
- [ ] VPS/cloud instance ready (recommended)
### Communication
- [ ] Emergency contact identified
- [ ] Reporting channel established
- [ ] NDA signed (if required)Scan Intrusiveness Matrix
By Mode
Mode
Intrusiveness
Detection Risk
Direct Contact
By Function
Function
Intrusiveness
Notes
Noise Levels Explained
Reducing Detection Risk
Start Passive
Use Rate Limiting
Use Scope Files
Use a VPS
Legal Framework by Region
United States
Law
What It Covers
European Union
Framework
What It Covers
United Kingdom
Law
What It Covers
General International
Bug Bounty Specific Guidelines
Before Testing
During Testing
What NOT to Do
❌ Don't
Why
Data Handling
What reconFTW Collects
Data Type
Location
Sensitivity
Security Practices
Reporting Guidelines
Incident Response
If You Find Critical Data
If Something Breaks
If You Receive a Cease & Desist
VPS and Infrastructure OPSEC
Recommended Setup
What NOT to Do
❌ Don't
✅ Do Instead
Quick Reference: Safe Scanning Checklist
Additional Resources
TL;DR
Last updated