Blackbox.
Pentest your production. Same harness that earned top 20 on Google's Hall of Fame.
Scope thissiege is our in-house AI harness — top 20 on Google's Hall of Fame, including RCE in Google Cloud production (Borg). A senior researcher drives every engagement.
siege runs at the scale of a full red team. It chains small primitives together into end-to-end exploits — the kind a regular AI scanner would never find, ones that Google's own security team missed.
Blackbox — siege attacks your production from the outside. Every request and response is captured.
Whitebox — siege reads every source file from the inside.
Every lead validated before a human sees it against a running dockerized/sandboxed copy of your service. Hallucinations dropped, severity corrected, PoC attached.
A human researcher reproduces each exploit, confirms impact, and writes the report.
siege has pulled in $500k+ in bounties, a top-20 slot in Google's Hall of Fame, and high/critical vulnerabilities across widely deployed open-source software.
siegelanded RCE inside Borg — the cluster manager that runs Google's production.
Rewarded $60,000 under Compromise of Google Cloud Production Environment.
Same vulnerability in Gitea and Forgejo — shared codebase. Codeberg runs Forgejo and hosts ziglang/zig, so the blast radius extends through Zig → Bun → Claude Code.
Numerous unauthenticated high/critical disclosing live access tokens and sensitive PII.


“We really like how simple, clear and impactful your reports are.”
Pick the one that fits the problem you're trying to solve.
Pentest your production. Same harness that earned top 20 on Google's Hall of Fame.
Scope thisAudit your source end-to-end. Same harness that found bugs in Gitea, MinIO, and Rocket.Chat.
Scope thisThreat modelling, design reviews, privacy assessments.
Scope this
Most of Arvin's public record is in the Google Vulnerability Reward Program — top 20 of all time, north of half a million US dollars in paid bounties across hundreds of reports, and recognition in Google's 2025 Year in Review.
His findings include a bug that leaks the phone number behind any Google account, a YouTube flaw exposing emails of 2.7 billion users, and remote code execution inside Borg, Google's production cluster manager.
siege has since caught bugs in Gitea, Forgejo, MinIO, ISPConfig, Rocket.Chat, and CKAN.
Send us a rough scope. We reply within one business day with a fixed quote.