lounge logo

Find the security researcher for your needs

Protocols connect with security researchers. Transparent budgets, fast qualification, direct collaboration.

Why Audit Lounge

Built for protocols and researchers who value transparency, and efficiency.

Transparent Budgets

Clear pricing up front. Researchers and protocols can qualify quickly before any back-and-forth starts.

Fast Qualification

Scope, timing, and stack fit are visible early so the right people move faster and the wrong ones self-filter.

Direct Contact

Once a fit is established, protocols and researchers move directly into contact without marketplace friction.

Curated Premium

Profiles and requests, are designed around quality and trust rather than raw volume.

How It Works

Four simple steps to connect protocols with security researchers.

01

Post Your Request

Protocols create detailed audit requests with budget, timeline, and technical requirements.

02

Researchers Apply

Qualified researchers review the listing and apply when the scope matches their expertise.

03

Review & Select

Protocols review applications, check proof of work, and choose the best fit for the engagement.

04

Collaborate & Deliver

Once selected, both sides can move into direct contact and execute the engagement efficiently.

Trust Through Transparency

Every audit request is public. Every researcher profile is public. No hidden agendas, no surprise fees. Just quality security work.

Verified researcher credentials and proof of work
Transparent budget and timeline expectations
Direct protocol-researcher communication
Curated marketplace for premium audits

Security First

Built for security professionals, with workflows designed around audit quality, researcher credibility, and clean communication.