Applies to all BCS publications, reports, and registry data
This report is based on data collected by passive network sensors. All findings represent observed technical behavior patterns. No claims are made regarding the intent, purpose, or ethics of any operator.
BCS observes automated traffic arriving at participating network nodes. Observations are logged with timestamps, IP addresses, User-Agent strings, and request paths. Bot identification is performed by matching observed User-Agent strings and IP ranges against operators’ own published declarations.
All observations referenced in BCS reports are backed by timestamped server logs. Operators who wish to review the specific evidence behind their score may request a private audit under NDA by contacting hello@botconduct.org.
Any operator named in a BCS report has the right to respond. Responses received before publication are included in the report. Responses received after publication are appended as addenda. Contact: hello@botconduct.org
BCS publications constitute security research and are protected under principles of freedom of expression, scientific inquiry, and responsible disclosure. BCS does not access, attack, or probe external systems. All data is collected from traffic that voluntarily enters BCS-monitored infrastructure.