@GossiTheDog @briankrebs I have seen "security researchers" use bug bounty / vuln reports as a pitch for their consulting company.
They find somthing and for a consulting / reoprt generation fee will desclose it to the impatcted compnay. If the compnay declines to pay the researcher issues threats that they will release it to the public or the company partners.
Its extortion by another name.