BC BotConduct
Evidence signed · Ed25519
§ Insurance · For underwriters · brokers · risk managers

Receiver-side evidence for cyber insurance underwriting.

Behavioral observation of automated activity directed at your public surface — signed, framework-mapped, admissible. Engineered for pre-bind, renewal, and post-incident requirements.

§ 02 · The problem

Underwriting moved beyond self-declaration.

Cyber insurers no longer accept plain self-attestation. Pre-bind questionnaires are being supplemented — and in many cases replaced — by requirements for concrete, verifiable evidence of how a property handles automated traffic. The trend is consistent across underwriters in the EU, the United States, and the United Kingdom.

The automated surface — bots, declared crawlers, AI agents, scraping infrastructure, and credential-replay operators — is one of the fastest-changing risk vectors directed at the modern public web, and one of the least measured. Most stacks observe it only when it converts into a blocked request or a fraud event. The conduct in between is, for most cyber programs, simply not recorded.

The usual response — captures of Cloudflare dashboards, screenshots of bot-management UIs, or attestations of unspecified provenance — does not qualify as forensic evidence. It is not signed, not framework-referenced, not independent of the vendor whose product is being evaluated, and not admissible for a subrogation claim. The gap between what applicants supply and what underwriters increasingly expect is widening.

Subject of evidence
Automated activity directed at the public surface — bots, crawlers, AI agents, scrapers.
Point of measurement
Receiver-side. Independent, at the property boundary.
Form of report
Signed PDF · Ed25519 · chain of custody · framework-referenced.
Independence
The Observatory does not sell the blocking, gating, or runtime products whose performance is being evaluated.
§ 03 · Forms of engagement

Three forms of engagement,
scoped to the underwriting cycle.

Each engagement produces evidence that can be presented to a broker, an underwriter, or counsel. Pricing is by quote; engagements are accepted by appointment.

№ 01 · Pre-bind

Pre-bind Assessment.

  • 14–21 days of receiver-side observation
  • Signed PDF · Ed25519 · chain of custody
  • Mapped to NIST AI RMF, OWASP Top 10 Agentic, EU AI Act Art. 15
  • One-page executive summary for broker & underwriter
Request quote
№ 02 · Renewal

Continuous Renewal Monitoring.

  • Continuous monitoring between renewals
  • Monthly signed reports
  • Cohort-anonymized benchmarks
  • Alerts for material changes
Request quote
№ 03 · Post-incident

Post-incident Forensics.

  • Urgent forensic engagement
  • Signed reconstruction of automated activity
  • Report admissible for claim & subrogation processing
  • Delivery time: 5–7 days
Request quote
§ 04 · Framework mapping

Evidence referenced against
frameworks underwriters recognize.

Every engagement is delivered with explicit cross-references to the regulatory and industry frameworks that brokers and underwriting committees cite. The mapping is the work.

NIST AI RMF
National Institute of Standards and Technology · Artificial Intelligence Risk Management Framework
OWASP Top 10 · Agentic
Open Worldwide Application Security Project · Top 10 for Agentic Applications
MITRE ATLAS
Adversarial Threat Landscape for Artificial Intelligence Systems
EU AI Act · Art. 15
European Union · Accuracy, robustness and cybersecurity provisions
Colorado AI Act
SB 24-205 · Consumer protections for interactions with artificial intelligence systems
RFC 9309
IETF · Robots Exclusion Protocol, formalized
ISO/IEC 27001
Cross-reference to information security management controls
§ 05 · Methodology

How the evidence is produced.

¶ 5.1

Independent instrumentation at the property boundary. Observation occurs where automated activity reaches the property. The Observatory does not displace existing security systems; it records what they do not.

¶ 5.2

Behavioral characterization, independent of declared identity. Operators are characterized by what they do, not solely by what they declare. Identity claims are recorded; they are not treated as conclusive.

¶ 5.3

Cryptographic signing — Ed25519 — immutable evidence chain. Each finding, each report, each cycle is signed and timestamped. The chain of custody is reproducible without recourse to the Observatory and is intended to survive transfer to a regulator, an auditor, or counsel.

¶ 5.4

Reports verifiable independently of WAF or CDN stack. The evidence does not depend on which perimeter products sit in front of the property. An underwriter or a broker can verify the chain of custody on their own infrastructure, without trusting either the Observatory or the vendor whose product is under evaluation.

§ 06 · For brokers

Working with cyber insurance brokers.

BotConduct works directly with cyber insurance brokers to deliver a consistent evidence pack across pre-bind and renewal cycles. The same report format, the same framework references, the same chain of custody — across a broker's book.

Co-branded reports are available under NDA. Custom data-handling arrangements are available for each operating jurisdiction. The Desk works directly with named brokers; we do not operate a partner portal.

Broker introduction

Engagements available by appointment.

Address correspondence to the Observatory Desk. Indicate form of engagement, jurisdiction, and renewal timeline.

Address the Desk