{"reports":[{"title":"Niche Security Reward Sprint","slug":"niche-security-reward-sprint-2026-05-12","summary":"A safe, authorized target selection brief for niche security reward work: cannabis POS, crypto invoicing, AI/ML supply-chain bounties, Web3 contests, and dark-pattern compliance offers.","status":"published","category":"Money Makers","accent":"#ef4444","publishedAt":"2026-05-12T20:55:00.000+00:00","sourcePath":"runtime-scouting-rounds","updatedAt":"2026-05-12T20:12:28.180+00:00","$permissions":[],"$createdAt":"2026-05-12T20:09:56.778+00:00","$updatedAt":"2026-05-12T20:12:28.226+00:00","$sequence":"019e1dcf-792a-7064-925b-de0adcd7d991","$id":"niche_bounty_20260512","$databaseId":"reports_hub","$tableId":"reports"},{"title":"Niche Security Target Scout","slug":"niche-security-target-scout-2026-05-12","summary":"A focused scouting report for authorized niche bug bounty targets in privacy-heavy and stigmatized verticals, ranked by achievability and reward potential.","status":"published","category":"Money Makers","accent":"#f97316","publishedAt":"2026-05-12T19:40:00.000+00:00","sourcePath":"/home/openclaw/sites/reports/content/niche-security-target-scout-2026-05-12.md","updatedAt":"2026-05-12T19:34:06.131+00:00","$permissions":[],"$createdAt":"2026-05-12T19:34:06.239+00:00","$updatedAt":"2026-05-12T19:34:06.239+00:00","$sequence":"019e1dae-a89f-701a-9d17-18d861d876d9","$id":"6a0380ae000bf10ab171","$databaseId":"reports_hub","$tableId":"reports"},{"title":"Security Bounty Sprint","slug":"security-bounty-sprint-2026-05-12","summary":"A focused Night Shift plan for higher-value, technically niche security and bug-bounty rewards with minimal client handling.","status":"published","category":"Money Makers","accent":"#ef4444","publishedAt":"2026-05-12T18:45:00.000+00:00","sourcePath":"/home/openclaw/sites/reports/content/security-bounty-sprint-2026-05-12.md","updatedAt":"2026-05-12T18:42:02.960+00:00","$permissions":[],"$createdAt":"2026-05-12T18:42:03.072+00:00","$updatedAt":"2026-05-12T18:42:03.072+00:00","$sequence":"019e1d7f-00c0-706f-8ebd-84da73753c3b","$id":"6a03747b0001aba5cbd7","$databaseId":"reports_hub","$tableId":"reports"},{"title":"BuildPulse UX Audit","slug":"buildpulse-ux-audit-2026-05-12","summary":"A polished presentation version of the BuildPulse UX audit: verdict, friction points, mobile fit, and next product moves.","status":"published","category":"UX Audit","accent":"#7c3aed","publishedAt":"2026-05-12T18:00:00.000+00:00","sourcePath":"/home/openclaw/.openclaw/workspace/buildpulse/docs/BUILDPULSE_UX_AUDIT_2026-05-12.md","updatedAt":"2026-05-12T18:14:10.064+00:00","$permissions":[],"$createdAt":"2026-05-12T18:14:10.191+00:00","$updatedAt":"2026-05-12T18:14:10.191+00:00","$sequence":"019e1d65-7a10-71d1-bd71-2f939f7feef3","$id":"6a036df200081b316579","$databaseId":"reports_hub","$tableId":"reports"}]}