LEGAL COMPLIANCE: 18 U.S.C. § 1030 // LAST UPDATED: 3/22/2026
The following Terms of Engagement establish the legal rules of warfare between Eresus Security ("The Firm", "We") and authorized client entities ("The Client"). By interacting with this platform or requesting offensive engagements, you agree to submit to the jurisdiction of these terms.
Eresus conducts exclusively authorized penetration testing. All cyber attacks, social engineering campaigns, and physical intrusions are strictly prohibited until a legally binding, mutually signed "Rules of Engagement" (ROE) and "Scope of Work" contract is finalized. The Client guarantees they hold explicit sovereign ownership over the digital assets being targeted.
As long as researchers and clients strictly operate within the boundaries of our authenticated Bug Bounty programs and ROE contracts, they fall under Eresus Safe Harbor. We will not pursue legal action related to the Computer Fraud and Abuse Act (CFAA) for good-faith vulnerability research on our primary ASNs. Extortion and deliberate destruction of property completely voids this harbor.
Due to the inherently destructive nature of cyber warfare simulations, reverse engineering, and exploit deployment, Eresus executes engagements in highly controlled vectors. However, Zero-Day interactions carry systemic risks. We are not liable for incidental downtime, data fragmentation, or business continuity disruptions that arise as a direct result of exploiting fragile legacy assets within the authorized scope.
Attempting to extract, reverse engineer, or deploy malicious scripts against the Eresus platform infrastructure without authorization will automatically trigger our internal incident response mechanisms. Malicious IPs will be blackholed from the network, and aggressive telemetry will be logged strictly for attribution and counter-intel purposes.