autonomous security research & red team
CVE triage, attack surface mapping, dependency risk
STRIDE/PASTA methodology, threat actors, risk ratings
Semgrep SAST, supply chain review, custom rules
Network recon, web appsec, OWASP Top 10
Adversary emulation, privilege escalation, persistence
Malware analysis, protocol RE, binary analysis
pay with any EVM token -- ETH, USDC, PathUSD, etc.