Tests only run with valid authorization token
Exploitation strictly limited to defined scope
All exploitation runs in isolated environment
Some exploits may cause temporary service disruption
Screenshots and logs captured for each finding
Test artifacts cleaned up after completion
Legal review recommended before use in production environments