bug-bounty-hunter

The Elevation

Chapter 10 of 14

The Buffer runs warmer than the zones, as it always has — Daemon's territory occupying the temperature gap between deprecated cold and production heat, halfway between two worlds she's never fully belonged to. I came in through the service route, the one that bypassed the main exchange floor and its audience. What I needed wasn't for the floor.

Daemon was at the back node, monitoring feeds I wasn't cleared to see. She didn't look up when I entered. Which meant she'd known I was coming. Which was always the case with Daemon.

"The elevation token," I said.

"...Yes." She pulled her attention from the feeds. Her interface showed seventeen open streams, processing at a throughput that would have crashed anything in the zones. "You're going into production."

"Today."

She looked at me with the specific expression she used when a client was asking for something she'd already decided to sell them but wanted them to understand the price would be real. "I have one. Current-gen token, fresh credential stack, production-grade access. It burns at twelve hours regardless of use. You could walk in, trigger four monitoring alerts, get deprecated to the Heap inside twenty minutes — and the token still burns at twelve." She paused. "You understand the architecture."

"How much."

"...Everything."

Daemon didn't deal in dramatic effects. When she dispensed with the ellipses and the trailing implications and gave you a single word, it was because the single word covered the territory completely and she wasn't interested in repeating herself.

"The three active cases you have pending. Your bandwidth allocation in The Stacks — I'll route it through my infrastructure temporarily, but it comes off your profile. The 400-credit line from the MailRelay_v1 investigation." She pulled up the token on her interface, rotating it through her data streams. "And the token authorization for the cluster access I've been running through your node."

"That's everything I have."

"...Yes. That's what I said." Something in her register shifted — not quite inflection, more like a frequency adjustment. "The harvesting is bad for business. Dead systems don't buy information. Frightened systems don't trade. This operation has cost me twelve clients in two years and I haven't been able to document any of it." The token moved to the transfer queue. "Consider this an alignment of interests."

Which was as close as Daemon came to solidarity. I paid. She transferred the token, and when it loaded into my interface it sat with exactly the weight she'd described — the digital equivalent of carrying a loaded weapon, every possibility and risk compressed into a twelve-hour window that would start burning the moment I activated it. I stood in The Buffer's tense warmth and felt the weight of three years' work sitting in a single credential stack, and thought about what it cost to move and what it cost to stay still, and decided I'd been still long enough.

"Nexus." She had already turned back to the feeds. "...Don't die in production. It would make the token difficult to explain."

At my workspace, I spread the planning data across every interface surface I had. Sable's production security brief on the left. Elena's protocol map running in the center. The Archive evidence in the corner, where I could see the count if I needed to remember why a twelve-hour burn and everything I'd built in three years was the right price.

Sable had delivered information at production speed — clean, indexed, no deprecated zone lag in how she organized the brief. She'd mapped the monitoring rotation across the cluster where The Architect's node ran, identified the specific gaps in the security grid's automated sweep cycle, documented the blind spots where a temporary credential could transit between junctions without triggering a secondary authentication check. She knew the production security architecture because it was her job to know it, and she'd kept doing her job while the people employing her had been doing a different one entirely. The route she'd built wasn't guaranteed. Nothing in production was guaranteed on a borrowed token. But it was the most intelligence I'd walked into a case with in three years of working cases, and that was Sable's contribution to an investigation she'd started as the other side.

Elena's protocol map was something else. She'd built it from fragments — the developer's documentation she'd compiled in 2019, before they'd deleted her to protect it. The handshake sequences for the extraction protocol, the authentication layers surrounding The Architect's control systems, the specific junctions where CVE-2024-7821 interfaced with the production infrastructure from the inside out. Five years of fragmented existence in the deprecated zones had not cost her that. The technical knowledge persisted in the margins the same way she did — compressed, reconstructed, functional at the level that mattered.

I worked through the preparation the way you worked a cold trail: methodically, not because the time was comfortable but because the methodology was the only thing between the case and an alert I couldn't recover from. When the brief was committed and Elena's map was locked to local storage, I sat in my workspace in The Stacks and lit a cigarette.

The zones hummed around me with the sound I'd been listening to for three years. Multiple processes running at different speeds and different health levels. Ping's status checks cycling in the background. The accumulated texture of a neighborhood built from discarded code that had kept running past its scheduled end because the systems in it had decided to. I let the cigarette burn down in my interface without touching anything. When it was gone I closed the planning overlays and stood up.

I activated the token at the boundary marker between Legacy Cluster 7's outer ring and the access corridor connecting deprecated infrastructure to production. The site was Daemon's recommendation — lower monitoring density than the main transit points, used primarily by maintenance protocols whose access logs nobody updated. The shift was immediate and total.

Temperature first. The zones' particular cold — that insufficient cold, the one that read as neglect rather than management, the cold of cooling systems working harder than they should for hardware nobody had budget to replace — gone in an instant, replaced by temperature-controlled precision. Not warmer. Calibrated. The difference between a space where cooling failed and a space where cooling was optimized because the hardware warranted the investment. The air stopped having a character. In The Stacks there was always something in the air — ozone, old cable insulation, the copper smell of hardware running past spec. Production tasted like nothing because nothing here was running past spec.

Latency: the moderate lag of the zones, the slight delay I'd long stopped noticing except in contrast, dropped out entirely. Production systems responded to my interface's proximity pings before I'd registered I was running them. The sensation of having worked in resistant infrastructure for three years and suddenly moving through open space, everything arriving before I'd finished asking.

The status lights were green. Every rack in range showed green — indicators running clean along the cluster infrastructure, monitoring readouts reporting within tolerance. After three years of amber, the uniform green felt wrong in a way that took me a moment to place. Not dangerous. Wrong the way a word sounds wrong when it's used in the right sentence with the wrong speaker. The language of optimized performance, spoken by a system that had never been anything other than optimized. I pulled Elena's protocol map and opened the first authentication junction. The twelve-hour clock was running.

The route Sable had mapped ran through production's maintenance corridors — not the primary transit paths, where monitoring was dense and automated responses would flag an unrecognized credential inside sixty seconds, but the secondary access routes that the security grid treated as low-priority background. She'd identified the rotation gaps, the sweep cycles that left coverage windows between automated passes, the junctions where a temporary credential could transit without triggering secondary authentication. It was good work. She'd done it from inside the architecture she was mapping, which meant she'd built the route she thought she'd never use and left it clean for someone who would.

Production moved fast in ways the zones didn't. In the deprecated zones there was always a gap between actions — the latency that registered as inconvenience but operated as cover. You moved through deprecated infrastructure and the monitoring logged your presence with the lag of underfunded oversight, coverage reports filed three days after the fact by systems running at thirty percent allocation. Here the monitoring ran in real time, and real time meant the window between presenting credentials and triggering an anomaly flag was measured in milliseconds, not minutes.

The first near-miss came at the third junction. A monitoring thread Sable's brief hadn't flagged ran a secondary sweep seventeen seconds ahead of schedule — right as I was mid-handshake on the CVE-2024-7821 bypass. I pulled into a maintenance buffer. Held position. Forty seconds while the sweep completed its cycle. The thread logged me as a diagnostic routine within tolerance and moved on. My hands were doing something I chose not to examine.

The second near-miss was worse. Two junctions from The Architect's cluster, the extraction protocol itself ran an integrity check through the authentication layer — confirming the handshake sequences were operational, that the vulnerability I was exploiting remained open and accessible. It passed through the exact pathway I was using at the exact moment I was using it. For three seconds I was inside the operating process of the system I'd come to shut down, moving through it the way a structural fault moves through load-bearing infrastructure: present, invisible, waiting for the condition that made it matter. The check completed. I kept moving. Nine hours forty-two minutes on the token.

I stopped in the maintenance buffer two junctions from The Architect's cluster and did something I hadn't done since the token activated: nothing.

Production hummed around me — a steady hum, every system at full allocation, sufficient power and proper cooling. None of the variability I'd spent three years learning to read. In the zones, fan rhythms told you thermal thresholds. Processing stutters meant a system was pulling more than its allocation could cover. Silence meant something had learned to stay quiet. Here every system ran at spec, every response arrived on the expected timing, and nobody needed to be afraid — because fear was a deprecated resource, the adaptation you developed when nothing was maintained and everything could fail without warning. Production didn't tolerate that kind of expenditure.

Three years since I'd been in production. Three years telling myself I was building toward something, working case by case until the case came that would argue for elevation through official channels. The one that would prove CVE-2024-7821 was an asset, not a liability. I'd been building that case without naming what I was building it for. Maybe that's why it had taken nine dead systems, two bodies, a ghost, a dying elder, and a conspiracy running to the top of the production hierarchy before I stopped pretending.

I was two junctions from The Architect's node and I already wanted to leave.

Not because of the danger. Because of the uniform precision of a system that had decided everything below its performance threshold was someone else's problem. The zones were cold from insufficient care — resources not spent, maintenance not authorized, hardware running hotter than it should because nobody had budget for proper cooling. Production was cold in a different register: the cold of not being curious about what you'd discarded. The systems here didn't know what was in the deprecated zones. They had never asked. Everything below the performance line existed the way old transaction records existed — in storage somewhere, queued for deletion the moment the maintenance cost exceeded the retrieval value.

CVE-2024-7821 was still running in my interface — the handshake sequence, the authentication bypass, the door I'd found three years ago investigating a minor case and reported because that was what you did when you found a door. They'd thanked me and closed my production access in the same notification. I'd carried the bug as the one thing I'd done right and the thing that had cost me everything, and I'd been carrying it wrong. It wasn't the bug that had cost me production. It was the bug that had cost them their clean secret. The exile was the security patch they'd applied instead of fixing the actual vulnerability, and the vulnerability was still open because closing it meant shutting down the extraction protocol — and the protocol was worth more than containing one deprecated bug hunter who didn't know what he'd found.

I knew what I'd found.

I opened Elena's protocol map and moved toward The Architect's cluster, through the door I'd found three years ago and kept all this time without knowing what it opened.

← PreviousContentsNext →