Most production systems are assembled under deadline pressure. Security gaps are the predictable result, not the exception. Independent research exists to find those gaps before adversaries do and to give the operators a chance to close them quietly.
Every engagement here follows coordinated vulnerability disclosure. No destructive testing. No data exfiltrated beyond what is needed to prove impact. No technical detail published until the affected organisation has remediated and granted written permission to be named.
The page below is what is safe to share now. As remediation lands and permissions clear, entries move from "Active" to the Hall of Fame and, where applicable, to full technical writeups.