Short answer
Reporting and safety workflows help users flag suspicious jobs, profiles, cases, companies, or conversations, especially when money requests, privacy exposure, fake evidence, harassment, or unsafe off-platform pressure appears.
- Decide if this page applies to: Builders who see unusual requests for payment, credentials, private data, or off-platform contact.
- Check first: The behavior involves safety, authenticity, privacy, payment, harassment, or misleading evidence risk.
- Avoid this mistake: Continuing to share resumes, screenshots, or account details after risk signals appear.
Use this page for
Draw the access boundary first
Separate what can be public, what needs a real hiring context, and what should pause the conversation.
Start
Signals worth reporting
Trust boundary checks
The behavior involves safety, authenticity, privacy, payment, harassment, or misleading evidence risk.
Next action
Read safety guide
If something feels wrong
Do not share more private material just to keep a conversation moving. Pause, keep the context, and use the relevant help or rule page.
Signals worth reporting
Common signals include requests for deposits, credential sharing, private identity documents, copied AI Builder case studies, fake company context, harassment, privacy leaks, or pressure to move sensitive conversations outside the platform.
What evidence helps
Useful reports include links, screenshots, message context, job or profile IDs, and a short explanation. The goal is to make risk review faster without asking users to expose additional sensitive data.
How to keep hiring moving
Pause suspicious contact, keep context, avoid sending more private material, and use platform Help or reporting pages. For normal evaluation uncertainty, return to role clarity and case-study evidence instead.
What you still need to confirm yourself
- Confirm whether the role scope, budget, timeline, and communication expectations fit you.
- Decide what client names, screenshots, files, or personal details should stay private.
- Use interviews or written follow-up to clarify responsibility, contract terms, and data access before starting work.
Check current rules before acting
Use these links to confirm what the platform currently supports. Then decide whether to browse, post, contact, or adjust evidence.
Trust boundary checks
Common mistakes
- Continuing to share resumes, screenshots, or account details after risk signals appear.
- Sending a vague report without links, screenshots, or a clear description of the issue.