🎯Trustline Hacktivity Guide
Overview
The Hacktivity on Trustline platform provides hackers with a centralized location to monitor recent activities related to programs and challenges. This user guide will walk you through the steps to navigate and understand the Hacktivity effectively.
Getting Started
1. Accessing Hacktivity
From the Trustline platform's homepage, locate the Hacktivity option in the menu bar.
A dropdown menu will appear with two sections: Programs and Challenges.
2. Viewing Programs Hacktivity
Selecting Programs from the dropdown menu will redirect you to a page displaying program information categorized into two sections: Disclosed and Undisclosed.
2.1 Disclosed Section
The Disclosed section presents detailed information about programs that have been made public. It includes:
Title: Report title, hacker name disclosed by, company, and date.
Date: The date when the report was disclosed.
Severity: The severity level of the reported vulnerability.
Bounty: Reward for the vulnerability or status if ineligible.
2.2 Disclosed details:
Clicking on a disclosed report directs users to a detailed page that summarizes the selected report:
The summary includes:
Official program report summary (non-editable):
Impact
Description
Recommendations
Timeline of actions performed by hackers, companies, or admins.
Icons for Twitter/X and LinkedIn are provided to share the report link on your chosen social media platform.
2.3 Undisclosed Section
The Undisclosed section lists programs that have not yet been made public. It includes:
Title: Program title, hacker name disclosed by, company, and date.
Weakness: Description of the identified security flaw.
Severity: The severity level of the reported vulnerability.
Bounty: Reward for the vulnerability or status if ineligible.
3. Viewing Challenges Hacktivity
To access the Challenges section, click on the Challenges option in the Hacktivity dropdown menu.
The Challenges section displays a table containing hacker information related to challenges. The table includes the following columns:
Challenge Name: The name of the specific challenge.
Hacker who solved the challenge: The username of the hacker who solved the challenge.
Solution Date: The date when the challenge was solved.
Difficulty Level: The level of difficulty of the challenge.
Category Name: The type or category of the challenge.
Last updated