From the article:
> Security professionals who wish to use Opus 4.7 for legitimate cybersecurity purposes (such as vulnerability research, penetration testing, and red-teaming) are invited to join our new Cyber Verification Program.
Yeah no. They can fuck right off with KYC humiliation rituals.
This seems reasonable to me. The legit security firms won't have a problem doing this, just like other vendors (like Apple, who can give you special iOS builds for security analysis).
If anyone has a better idea on how to _pragmatically_ do this, I'm all ears.