SHARE SYSTEM LOGS

You send your system logs to the ethical hacker, hoping they can uncover something crucial.

A few moments later, you get a reply: "I’ve found something suspicious. This is bigger than we thought."

"This could expose everything. Are you ready for this?"

What will you do next?

  1. Reveal the vulnerability to the public to force action.
  2. Close the leak and delete all traces.