Dear "Security Researchers"

Beg-bounty “security research”

  • Many comments share spoofed or real examples of extortion-flavored “bug bounty” emails: trivial findings described as “critical” with threats of public disclosure and inflated dollar values.
  • Reports are often obviously wrong (e.g., flows that don’t exist, “auth bypass” via copying an admin session cookie, reading local DB on rooted phones, missing headers on static sites).
  • This behavior is likened to generic email scams and described as a kind of DoS on whoever must triage the reports.

Automated scanners, AI, and CVE noise

  • People note a surge of low-quality, tool- or AI-generated reports (e.g., SSL/dmarc/header scanners, regex DoS detectors) that label marginal issues as high-severity vulns.
  • This drives “scareware”: every theoretical issue becomes “COULD be exploited,” independent of context or threat model.
  • CVE/CVSS are criticized as easily gamed and often mis-scored, generating npm/audit noise and pressure on maintainers to fix non-issues.
  • Some mention countermeasures like context-aware scanning and mechanisms to mark CVEs as false positives, but note they’re not widely integrated.

Impact on maintainers and system owners

  • Maintainers, especially in OSS, describe burnout: inbox spam, harassment, threats of CVEs, and zero compensation.
  • Low signal-to-noise means legitimate, high-quality reports can be ignored along with the junk.
  • The Debian mirror notice is seen by some as understandable pushback after years of such abuse.

Bug bounties, incentives, and disclosure

  • “Beg bounty hunters” are said to have damaged the reputation of genuine security research.
  • Researchers report being ghosted after responsible disclosure, sometimes even by security companies; others describe threats of lawsuits.
  • Some argue it’s irrational to do unpaid security work without a prior agreement; others do it for interest/civic duty but accept lack of rewards.

Broader views on security and risk

  • Several comments stress the importance of basic security hygiene despite industry dysfunction.
  • There’s debate over how often “the stars align” for real exploits and how to reason about risk vs. noise.
  • One view frames much of the security industry as liability-shifting theatre; another notes that, even so, hiring security firms can still materially harden systems.

Thread-specific notes

  • The ftp.bit.nl operator joins, adds a security.txt, and clarifies the server is intentionally public (with a joke “pr0n” directory) to deter bogus reports.