Two first-year computer science students at Stellenbosch University have dedicated their efforts to identifying vulnerabilities in both government and private-sector systems. They approach this task with a strong commitment to legality, utilizing only publicly available internet resources, such as the backends of various government portals.