1. Under the authorization of the company, conduct penetration testing, security testing, and vulnerability mining on systems, networks, servers, and App