Fluid Attacks requires all talent to treat all client information, including vulnerability reports, with the utmost confidentiality and integrity, and to avoid any actions that could compromise the client's security or privacy. This includes refraining from using discovered vulnerabilities for unauthorized access, personal enrichment, or any other self-serving purposes.