This repository is for authorized cybersecurity education and testing in controlled environments.
If you discover a security issue in lab code or automation, please report it privately to the maintainers before public disclosure.
Include:
- Affected file(s) and workflow
- Reproduction steps
- Impact assessment
- Suggested fix (if available)
- Only test systems you own or have explicit written authorization to assess.
- Never target public infrastructure or third-party systems without permission.
- Follow institutional and legal policies for offensive security exercises.