Instructions
The Instructions tab contains client-provided guidance, requirements, and resources for your project.What Are Instructions?
Instructions are detailed guidance from clients about:- Technical requirements
- Access credentials
- Testing boundaries
- Compliance requirements
- Specific methodologies
- Tools to use or avoid
- Reporting preferences
Viewing Instructions
- Navigate to your project
- Click the “Instructions” tab
- Read all instructions before beginning work
Types of Instructions
Technical Requirements
Scope Boundaries
Credentials & Access
Reporting Requirements
Following Instructions
Read Completely First
Clarify Uncertainties
If something is unclear:- Ask in project chat
- Reference the specific instruction
- Wait for clarification before proceeding
- Document the clarification
Document Compliance
As you work:- Note which instructions you’ve followed
- Flag any instructions you couldn’t follow
- Explain deviations in your deliverables
Common Instruction Categories
Rules of Engagement
| Rule | What It Means |
|---|---|
| Testing Window | When you’re allowed to test |
| Rate Limiting | Max requests per second |
| No Destructive Testing | Don’t delete or modify data |
| Notify Before | Contact before certain tests |
| Emergency Contact | Who to call if issues arise |
Data Handling
- What data you can export
- How to handle PII
- Encryption requirements
- Deletion requirements post-project
Communication
- Who to contact for questions
- Response time expectations
- Escalation procedures
- Meeting schedules
When Instructions Conflict
If instructions conflict with:Platform Policies
Platform policies take precedence. Flag the conflict to platform ops immediately.Best Practices
Discuss with client. Explain your concerns and propose alternatives.Legal Requirements
Never violate laws. Escalate to platform ops if asked to do something illegal.Updating Instructions
Clients may update instructions during the project:- You’ll be notified of changes
- Review updates promptly
- Ask questions if changes affect your approach
Significant instruction changes may warrant scope or timeline adjustments. Discuss with platform ops.
Security Considerations
Handling Credentials
Store credentials securely
Never share outside the project
Use provided VPN when required
Delete credentials after project ends
