Garden State Cyber CTF

Eligibility & Competition Rules

Participation in the Garden State Cyber Capture-the-Flag (GSCTF) competition is governed by the eligibility requirements and rules outlined below. These guidelines ensure a fair, educational, and professionally-conducted event for all schools and competitors.


1. Eligibility Requirements

To participate in the Garden State Cyber CTF, students must meet the following criteria:

Eligibility is verified through school registration submitted by the teacher/advisor.


2. Team Structure

Once the competition begins, no changes may be made to team membership.


3. Registration Process

Teachers are responsible for the accuracy of submitted information and team placement.


4. Competition Accounts & Privacy

To protect student privacy:

No student personal information exists within the CTF competition platform (CTFd.io).


5. Competition Advancement

Advancement rules:

Code of Conduct

Garden State Cyber is committed to providing a safe, respectful, and academically focused competition environment. All participants are expected to uphold the following standards.

NOTE on use of Artifical Intelligence: AI tools are encouraged as a learning resource and CTF tool. They can help explain concepts, suggest approaches, or assist with tool syntax. However, participants should be aware that some GSCTF challenges are intentionally designed to be AI-resistant. These challenges may include misleading context, incomplete data, or elements meant to produce incorrect AI conclusions. Hands-on investigation and validation are essential.


Unacceptable Participant Behavior

The behaviors below are prohibited and may result in disqualification.

1. Cheating & Unauthorized Collaboration

Prohibited actions include:


2. Platform Misuse


3. Inappropriate Online Conduct

GSCTF does not host public discussion forums. However, students often use external platforms (such as Discord) independently.

We strongly advise participants:

If you have to question whether something is appropriate, it likely is not.


5. Malicious Activity

The following are strictly forbidden:


6. Attacks Against Competition Infrastructure

Participants may only target systems explicitly designated as challenges.

Illegal or unauthorized actions include:


7. Reporting Violations

If you witness or experience Code of Conduct violations, please report them to your teacher/advisor.
ONLY teachers may report violations to GSCTF. These reports may be submitted to the Garden State Cyber email address used to distribute credentials.


8. Enforcement

Failure to comply with the Garden State Cyber CTF Eligibility Rules or Code of Conduct may result in:


Garden State Cyber reserves the right to make eligibility determinations and disciplinary decisions in the best interest of competition integrity and student safety.