Application intake
Candidates submit public portfolio links, consent and topic preferences.
Contributor operations
The program gives students and junior cybersecurity practitioners a safe path to build public portfolio work without weakening editorial trust, author identity standards or publication controls.
Candidates submit public portfolio links, consent and topic preferences.
The system scores public writing, technical samples, GitHub, LinkedIn and availability.
Candidates scoring 55 or higher receive a non-public test brief with a 7-day deadline.
Editors score the draft for source quality, technical clarity, safety and originality.
Accepted articles move to an internal HackWatch editorial draft state. Contributors cannot publish directly.
After first accepted publication, an author profile can be created from verified author-approved data.
New authors are created as contributors. They can submit drafts, respond to revisions and maintain verified profile links, but they cannot publish directly.
Editors review submissions, request revisions, approve or reject drafts, control HackWatch editorial drafts and enforce correction and safety policies.
Every contributor article remains a HackWatch editorial draft until an editor approves it. Author pages use real data and external links confirmed by the author.
Candidate data is retained for 6 months without additional consent. HackWatch does not collect sensitive personal data, private victim data, secrets, credentials or public emails scraped from comments without explicit consent.