Westgate Data Science Security Research Program
Break Churchill.If you can.
Churchill Protocol protects critical systems in production environments worldwide. We're inviting elite security researchers to test its limits in a controlled environment—with real rewards for real results.
What is Churchill Protocol?
Churchill is Westgate's runtime application protection system. It wraps around executables to provide real-time defense against reverse engineering, tampering, and unauthorized extraction.
Deployed in production environments where failure is not an option, Churchill enforces strict limits on what code is allowed to run and how protected applications can be accessed.
The Challenge
A Churchill-protected application. A hidden flag. Your skills. Can you extract what we're protecting?
Access the Environment
Register with your GitHub account and accept our research agreement. You'll receive access to an isolated sandbox running a Churchill-protected application.
Attempt the Bypass
Use your expertise to analyze, probe, and attempt to circumvent Churchill's protections. Extract the flag hidden within the protected application.
Claim Your Reward
Successfully extract the flag? Submit your findings. Valid bypasses are rewarded, and exceptional techniques may qualify for additional recognition.
Rules of Engagement
What You Can Do
- ✓Analyze the protected binary and its behavior
- ✓Attempt to bypass runtime protections
- ✓Use debugging tools and reverse engineering techniques
- ✓Document and report your methodology
What's Off Limits
- ✗Attacking infrastructure outside the sandbox
- ✗Attempting to exfiltrate the challenge environment
- ✗Sharing access credentials or solutions publicly
- ✗Denial-of-service or destructive attacks
Real Research. Real Rewards.
We value your expertise. Successful bypasses of Churchill's protections are eligible for monetary rewards. Exceptional findings that lead to improvements in Churchill may qualify for our enhanced bounty tier.
Begin Your Research