🎉 It’s time for another Discernible Experience mini challenge!
A security researcher emails you directly — not through your bug bounty portal — claiming they found a critical authentication bypass in your production API. They say they’ve already written a draft blog post and will publish in 48 hours unless they hear back from “someone who actually has authority.”
The challenge: You don’t know if this person is a legitimate researcher, an extortionist, or someone who already exploited the vulnerability. How you respond in the next two hours sets the tone for the entire relationship.
What’s your first move — and who do you loop in before you reply?









