The U.S. government has set aside $150,000 for hackers in return for the vulnerabilities they find.
Ready your keyboards, hackers.
The Pentagon has opened registration for its pilot computer bug bounty program. The United States Department of Defense will pay people in return for the vulnerabilities they find in its public facing websites.
Many top tech companies including Google goog , Microsoft msft , and Facebook fb —but notably not Apple aapl —already run bug bounty programs of their own. However, this is the first of its kind for the federal government.
Get Data Sheet, Fortune’s technology newsletter.
“This initiative will put the department’s cybersecurity to the test in an innovative, but responsible way,” Defense Secretary Ash Carter said in a statement. (Carter first announced the initiative at the RSA Conference, a cybersecurity industry confab held earlier this month.) “I encourage hackers who want to bolster our digital defenses to join the competition and take their best shot,” he said.
The government has history of debuting infamously buggy websites, spanning from faulty online tools at the IRS, to the disaster at healthcare.gov. By incentivizing hackers to find flaws before they cause a crisis, the defense department could begin to nip such problems in the bud.
For more on hacking, watch:
The department did not disclose the sum of bounty payouts, although it said that it would draw from a pool of $150,000 in funding set aside for rewards. The competition officially begins April 18 and extends through May 12.
The Defense Department has enlisted HackerOne—a bug bounty startup that spun out of Facebook, and that runs similar programs for Twitter twtr , Adobe adbe , Yahoo yhoo , and most recently Uber—to manage the pilot.
The department said it will screen anyone who submits a valid computer bug report. Participants will be able opt out of that criminal background check, the department said, adding that they will also forfeit any potential reward.