How does it work?

The general workflow of a bug bounty program

Dmytro avatar
Written by Dmytro
Updated over a week ago
  • We help our client to create a Bug Bounty Policy – a document that describes in detail what resources are within scope/out of scope, what is the reporting procedure, what are the rewards for various vulnerabilities and other rules.

  • Once that’s done – we invite our hacker community to take part in the newly launched bug bounty program.Hackers begin continuous testing of our client’s digital assets.

  • All vulnerabilities are being reported via the HackenProof platform. Our triage team validates each report and reward researchers.

  • A client can monitor their program activity 24/7 and gets live updates on found vulnerabilities and money spent.

Did this answer your question?