We help our client to create a Bug Bounty Policy – a document that describes in detail what resources are within scope/out of scope, what is the reporting procedure, what are the rewards for various vulnerabilities and other rules.
Once that’s done – we invite our hacker community to take part in the newly launched bug bounty program.Hackers begin continuous testing of our client’s digital assets.
All vulnerabilities are being reported via the HackenProof platform. Our triage team validates each report and reward researchers.
A client can monitor their program activity 24/7 and gets live updates on found vulnerabilities and money spent.
The general workflow of a bug bounty program

Written by Dmytro
Updated over a week ago