How does it work?

The general workflow of a bug bounty program

  • We help our client to create a Bug Bounty Policy – a document that describes in detail what resources are within scope/out of scope, what is the reporting procedure, what are the rewards for various vulnerabilities and other rules.
  • Once that’s done – we invite our hacker community to take part in the newly launched bug bounty program.Hackers begin continuous testing of our client’s digital assets.
  • All vulnerabilities are being reported via the HackenProof platform. Our triage team validates each report and reward researchers.
  • A client can monitor their program activity 24/7 and gets live updates on found vulnerabilities and money spent.