In scope
Authorized testing
Passive observation
Log analysis
Behavioral failure modes
Out of scope
Exploit weaponization
Active scanning without authorization
Denial-of-service testing
Data exfiltration