Contact
Controlled Intake
Iron Harbor X uses controlled email intake to reduce public attack surface and preserve traceable handling of inquiries. The contact address is active and validated for external inbound messages.
Do Not Send
Do not include secrets, credentials, private keys, passwords, exploit payloads, malware samples, sensitive production data, classified material, restricted documents, or attachments unless they have been explicitly requested.
Initial Inquiry Format
Use the format below for the first message. Keep the initial inquiry limited to objective, environment, scope, and contact information.
Name: Organization: Role / Title: Contact Email: Inquiry Type: Environment Type: Requested Scope: Urgency Level: System Status: Production / Lab / Personal / Research Third-Party Authorization Involved: Yes / No Attachments Expected: Yes / No Brief Objective:
Inquiry Types
Security Services
- Security assessment
- Secure system configuration
- Deterministic environment setup
- Controlled adversarial review
Research and Collaboration
- CCTG challenge inquiry
- Research collaboration
- Wearable defensive R&D
- Mission-critical or defense-sector inquiry
- General business inquiry
Initial contact is reviewed manually. Sending material outside the requested inquiry format may delay review or result in no response.