1. Do not perform denial-of-service (DoS) attacks.
2. Social engineering attacks against employees are strictly prohibited.
3. Physical security testing is out of scope.
4.The bug-hunter allowed to use AI scanners
5.allow for system access if bug-hunter found an RCE though file upload or any vector