Forum Rules & Guidelines 🔰
-
General Forum Rules
1. Respect & Professional Conduct
- Treat all members with respect and courtesy
- No harassment, bullying, discrimination, or personal attacks
- Disagree with ideas, not people - keep discussions constructive
- No hate speech, offensive language, or inappropriate content
- Respect different skill levels - we all started as beginners
2. Quality Content
- Use clear, descriptive thread titles
- Post in the appropriate category
- Search before posting to avoid duplicates
- Stay on topic within threads
- No spam, advertising, or self-promotion without moderator approval
- Use proper formatting and code blocks for technical content
3. Account & Privacy
- One account per person
- No impersonation of others or organizations
- Protect your own privacy - don't share sensitive personal information
- Respect others' privacy - no doxxing or sharing private information
4. Language & Communication
- English & Sinhala are the primary languages (unless in designated areas)
- Use proper grammar and spelling when possible
- Avoid excessive use of caps, emojis, or text speak
- No trolling, flame wars, or derailing discussions
5. Moderation
- Moderator decisions are final
- Report rule violations using the report button
- Don't mini-mod (backseat moderate) - let moderators handle issues
- Constructive feedback about the forum is welcome in Site Feedback
Cybersecurity Ethical Guidelines
1. Legal Compliance
- All activities discussed must be legal in your jurisdiction
- Only perform security testing on systems you own or have explicit written permission to test
- Unauthorized access to computer systems is illegal and will result in immediate ban
- Do not discuss or facilitate illegal activities
2. Responsible Disclosure
- Follow responsible disclosure practices for vulnerabilities
- Do not publicly disclose unpatched vulnerabilities or zero-days
- Give vendors reasonable time to patch before disclosure (typically 90 days)
- Coordinate with security teams when reporting vulnerabilities
3. Prohibited Content
Absolutely no posting of:
- Malware, viruses, ransomware, or malicious code designed to harm systems
- Working exploits for unpatched vulnerabilities
- Personal data obtained without authorization (passwords, credit cards, PII)
- Instructions for illegal hacking or unauthorized access
- Phishing kits, credential stuffers, or fraud tools
- Methods to bypass security for illegal purposes
4. Educational Purpose Only
- All security discussions must be for educational and defensive purposes
- Tools and techniques should be used to improve security, not compromise it
- When discussing offensive security, always emphasize ethical boundaries
- CTF writeups and lab exercises are encouraged
5. Vulnerability Discussion Guidelines
You MAY discuss:
- Publicly disclosed CVEs with available patches
- Theoretical attack vectors for educational purposes
- Security research methodologies
- Defensive strategies and mitigations
You MAY NOT share:
- Private exploits or proof-of-concept code for active threats
- Details that could enable attacks on unpatched systems
- Information about targets without their consent
6. Penetration Testing Ethics
- Always obtain written authorization before testing
- Define clear scope and rules of engagement
- Respect boundaries and stop if you find critical issues
- Report findings professionally and responsibly
- Do not access, modify, or delete data beyond what's necessary
7. Tool Usage Responsibility
- Security tools are dual-use - use them ethically
- Document legitimate use cases when sharing tools
- Warn about potential misuse implications
- Do not provide step-by-step instructions for malicious use
8. Data Handling
- Do not share leaked databases or stolen credentials
- Respect data privacy laws (GDPR, CCPA, etc.)
- Use sample/dummy data in examples and tutorials
- Properly anonymize any real-world examples
Consequences for Rule Violations
Warning System
- First Offense: Written warning and content removal
- Second Offense: Temporary ban (7-30 days)
- Third Offense: Permanent ban
Immediate Permanent Ban
- Sharing malware or malicious code
- Posting illegal content
- Doxxing or sharing private information
- Coordinating illegal activities
- Creating multiple accounts to evade bans
Serious Violations
The following will be reported to appropriate authorities:
- Discussion or planning of illegal hacking
- Sharing exploits for critical infrastructure
- Child exploitation material
- Terrorism or violence planning
- Large-scale fraud schemes
Best Practices for Community Members
For Beginners
- Read the stickied posts in each section
- Use the search function before asking questions
- Provide context when asking for help
- Show what you've already tried
- Thank those who help you
For Advanced Members
- Be patient with beginners
- Explain concepts, don't just give answers
- Share knowledge generously but responsibly
- Mentor others in their learning journey
- Lead by example in ethical conduct
For Everyone
- Think before you post: Would this help or harm someone?
- Ask yourself: Is this legal and ethical?
- Remember: Everything you post is permanent and may be seen by future employers
- Stay curious: Security is always evolving - keep learning
- Give back: Help others as you've been helped
Reporting Violations
If you see content that violates these rules:
- Use the Report button on the post
- Provide specific details about the violation
- Do not engage with the violator
- Let moderators handle the situation
For urgent security concerns or illegal activity: Contact moderators immediately via private message.
Contact Moderators
For questions about these rules or to appeal a moderation decision, contact the moderation team through:
- Private message to moderators
- Site Feedback section (for non-urgent matters)
By participating in this forum, you agree to abide by these rules. Ignorance of the rules is not an excuse for violations.
Last Updated: January 2026
These rules may be updated at any time. Check regularly for changes. -
X XploitLK pinned this topic