Blackbox.
Pentest your production. Same harness that earned #16 on Google's Hall of Fame.
Scope thissiege runs at the scale of a full red team. It chains small primitives together into end-to-end exploits — the kind a regular AI scanner would never find, ones that Google's own security team missed.
Blackbox — siege attacks your production from the outside. Every request and response is captured.
Whitebox — siege reads every source file from the inside.
Every lead validated before a human sees it against a running dockerized/sandboxed copy of your service. Hallucinations dropped, severity corrected, PoC attached.
A human researcher reproduces each exploit, confirms impact, and writes the report.
siege has pulled in $500k+ in bounties, a #16 slot in Google's Hall of Fame, and high/critical vulnerabilities across widely deployed open-source software.
siegelanded two separate RCEs inside Borg — the cluster manager that runs Google's production.
Rewarded $135,000 ($60k + $75k) under Compromise of Google Cloud Production Environment.
Same vulnerability in Gitea and Forgejo — shared codebase. Codeberg runs Forgejo and hosts ziglang/zig, putting the Zig programming language's supply chain in the blast radius.
Numerous unauthenticated high/critical disclosing live access tokens and sensitive PII.


“We really like how simple, clear and impactful your reports are.”
Pick the one that fits the problem you're trying to solve.
Pentest your production. Same harness that earned #16 on Google's Hall of Fame.
Scope thisAudit your source end-to-end. Same harness that found bugs in Gitea, MinIO, and Rocket.Chat.
Scope thisThreat modelling, design reviews, privacy assessments.
Scope this
Most of Arvin's public record is in the Google Vulnerability Reward Program — top 20 of all time, north of half a million US dollars in paid bounties across hundreds of reports, and recognition in Google's 2025 Year in Review.
His findings include a bug that leaks the phone number behind any Google account, a YouTube flaw exposing emails of 2.7 billion users, and remote code execution inside Borg, Google's production cluster manager.
siege has since caught bugs in Gitea, Forgejo, MinIO, ISPConfig, Rocket.Chat, and CKAN.
Send us a rough scope. We reply within one business day with a fixed quote.