Frequently asked questions

Frequently
asked questions

Here you will find answers to questions about eligibility, registration, scoring, and competition rules. If you cannot find the answer to your question, please reach out to us via our official Discord server or email [email protected].

Who is eligible to participate in the CTF?

Why was my registration rejected?

Can I participate as part of a team?

Can I cancel or transfer my registration spot?

How does the dynamic scoring system work?

Are AI tools allowed during the competition?

What is the prize and how is it awarded?

What are the consequences of cheating or fraud?

What happens if I publish solutions or write-ups during or after the competition?

How do I report a technical issue during the competition?

What happens if I suspect another participant is cheating?

How are country, corporate, and university rankings determined?

Will my score count towards a company if I am a freelancer or contractor?

Will I be counted as an active student if my university dates are missing?

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Get an AI summary of Fluid Attacks

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.