Back to dashboard Read module

Quiz reading view

Quiz 01U — Safe Harbor, VDPs, and Bug Bounty Legal Limits

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Safe Harbor, VDPs, and Bug Bounty Legal Limits as learned.

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Safe Harbor, VDPs, and Bug Bounty Legal Limits as learned.

Type Quiz
Updated 2026-04-17
Reading time 10 min read
Questions 10

Check the reading before you move on.

01u-safe-harbor-vdp-bug-bounty.md | Last updated: 2026-04-17

**DISCLAIMER:** Educational purposes only. Not legal advice.

Question 1

In Van Buren v. United States (2021), a police officer ran a license plate search using his legitimately issued credentials, but for personal gain rather than official law enforcement purposes. The Supreme Court held this was NOT a CFAA violation. Which statement best describes the legal test the Court established?

Question 2

A bug bounty program's scope page reads: "*.megacorp.com is in scope." A researcher discovers an IDOR in app.megacorp.com that chains through an in-scope API gateway into the backend payment processing system, which is explicitly excluded from scope. The researcher follows the chain and documents the payment system's internal API structure. What is the most accurate legal assessment?

Question 3

In United States v. Auernheimer (3d Cir. 2014), the conviction was vacated. Security researchers frequently cite this case as establishing that accessing publicly exposed data does not violate the CFAA. What does the case actually hold?

Question 4

A HackerOne program includes standard safe harbor language stating the company "will not pursue civil action or initiate a complaint to law enforcement for accidental, good faith violations of this policy." A researcher operating within scope finds a critical vulnerability. The DOJ independently learns of the testing activity. Which statement about the safe harbor's effect on criminal prosecution is most accurate?

Question 5

The DOJ 2022 CFAA Charging Policy identifies several behaviors that undermine a good-faith research claim. Which of the following behaviors does the policy explicitly flag as inconsistent with good-faith research?

Question 6

A researcher based in California tests a company's servers (also in California) via a HackerOne program with an explicit safe harbor clause. The testing falls within scope. Which of the following legal exposures is NOT addressed by the HackerOne safe harbor?

Question 7

Under the 2024 DMCA security research exemption (37 C.F.R. § 201.40(b)(12)), which of the following activities would NOT qualify for protection?

Question 8

A researcher discovers an SQL injection vulnerability on an in-scope target. To "prove scale," the researcher extracts 50,000 user records including names, emails, and hashed passwords, then transmits the dataset to a colleague for verification. Under the Stored Communications Act (18 U.S.C. § 2701) and GDPR Art. 5(1)(b), what exposures are created?

Question 9

Google Project Zero's coordinated vulnerability disclosure timeline allows 90 days from vendor notification, with an extension to 104 days if the vendor commits to a patch by day 90. A researcher discloses publicly on day 75 after finding the vendor's initial response inadequate. Which legal consequence is most likely?

Question 10

A researcher uses Tor to anonymize their testing sessions against an in-scope bug bounty target. The program's safe harbor language makes no mention of anonymization tools. Which statement best describes the legal risk this creates?