NewAI Security Contest Platform

Secure your AI code
with the world's best
security researchers

Run competitive security contests with elite global researchers. Get real vulnerabilities found, validated, and fixed — faster than traditional audits.

Trusted by security-first teams

Pashov Audit GroupPashov Audit Group
Code RunnersCode Runners
WhyZerantiq

Security you can explain. Results you can ship.

Find vulnerabilities early, prioritize what matters, and deliver clear fixes your team and customers can trust.

Human-reviewed findingsScoped researcher accessBoard-ready report exports
Applications & APIsCustom Apps • IAM
Cloud & DevOpsTerraform • IaC
Data SecurityPII • Payments • GDPR
InfrastructureServers • Core Systems
BuiltFor every stakeholder

Tailored for every stakeholder.

Whether you're launching a security contest, hunting bugs, or triaging reports, Zerantiq adapts the flow around the exact job to be done.

Companies & Protocols

Project Owners

Switch perspective to see the exact interface, guardrails, and incentives each part of the platform is optimized around.

Outcome-based securityBoard-ready proofSafe external access
01

Outcome-Based Security

Pay only for validated vulnerabilities, not for hours. True results-driven security investment.

02

Real-World Bugs Scanners Miss

Logic, business, and high-impact edge cases found by top human researchers that automation overlooks.

03

Controlled & Safe

Scoped access, sandboxed testing, and structured rules reduce risk while maximizing coverage.

04

Audit-Ready Proof

Every finding comes with reproducible steps, severity rubric, and fix-ready packet for compliance.

FlowHow Zerantiq works

Your journey, step by step.

Switch perspectives to see how owners, researchers, and reviewers move through one shared operating system.

Project Owners

Request a Contest

Submit your project details, set your reward pool, and link your GitHub repository.

5 guided steps🏢 role-specific viewsEvidence stays structured
1

Request a Contest

Submit your project details, set your reward pool, and link your GitHub repository.

2

Get Approved

3

Go Live

4

Review Findings

5

Get Your Report

Create ContestDraft
DeFi Protocol Security Audit
$50,000 USDC
github.com/org/defi-protocol
14 days
ModesTwo security engines

Choose your security engine.

Run high-pressure contests with external researchers or gate sensitive releases with internal reviewers.

Contest Mode

External security contests

Pressure-test AI products with vetted outside researchers working against a tight, high-signal brief.

  • Agent Logic Stress-TestsResearchers specifically target AI autonomous actions and tool-use vulnerabilities.
  • Time-Boxed IntensityGet higher coverage in 2 weeks of contest frenzy than months of traditional consulting.
  • Curated ResearchersEvery researcher is vetted via KYC and NDA. Only the top percentile sees your code.
  • AI-Native FocusBuilt for stacks relying on Copilots, LLM backends, and generated logic.

Enterprise Gate

Internal review workflows

Route sensitive releases through a sealed internal gate when access control matters more than open participation.

  • Zero-Trust SandboxesGrant internal depts (Legal, HR, Security) review access without exposing repo write permissions.
  • Ephemeral AccessTokens and access scopes are generated for the review window and auto-revoke immediately after.
  • Unified LedgerCompliance, Risk, and Devs work on a single sealed log. No more scattered email sign-offs.
  • Production GatesPrevent deployment until specific internal teams have signed the cryptographic release packet.
PathThe workflow

Secure from brief to sealed export.

Every contest and internal gate follows the same visible chain of custody, from scoped access to final proof.

Scope lockedScoped access liveEvidence sealed
01

Define Scope

Select a public contest or a private internal gate. Set your bounty or approval workflow.

02

Provision Access

Zerantiq spins up isolated sandboxes. External researchers or internal staff get read-only, scoped access.

03

The Review

Live vulnerability feed populates. Reviewers validate external findings; Internal leads sign off on risks.

04

Seal & Export

Fixes verified. Access revoked. A cryptographically sealed audit report is minted for the board.

ReadyTo ship?

Launch your contest or set up your internal gate.

Start with a public-facing contest when you need outside pressure testing, or lock a release behind an internal review gate when access needs to stay sealed.

14-day launch windowsScoped researcher accessBoard-ready report exports