Trustline Platform User Guide
Hacker Guides
Hacker Guides
  • Overview
    • 💡Quick Start
  • Trustline Products
    • 🐞Trustline Assessment Guide
      • 🏴‍☠️Apply to be a Pentester
      • ✉️Accept Invite to Assessment
      • 📝Assessment Testing
      • ⬇️Assessment Reporting
      • 🔁Assessment Remediation
      • ✔️Assessment Completion
    • 🕷️Trustline Bounty Guide
    • 🛡️Trustline Disclosure Guide
    • 🚩Trustline Challenges Guide
  • References
    • 📄Manage Reports Guide
    • 🔄Retesting Guide
    • 🏆Leaderboard and Hacktivity
      • 🎖️Trustline Leaderboard Guide
      • 🎯Trustline Hacktivity Guide
    • 🥇Trustline Point System
Powered by GitBook
On this page
  • Overview
  • Getting Started
  • 1. Submitting Vulnerability Findings
  • 2. Cancelling a Report
  • 3. Adding Comments
  • References
  1. References

Manage Reports Guide

PreviousTrustline Challenges GuideNextRetesting Guide

Last updated 9 months ago

Overview

Managing reports as a hacker on Trustline Platform involves submitting vulnerability findings, cancelling reports when necessary, and adding comments to provide further context or updates.

Getting Started

1. Submitting Vulnerability Findings

When identifying a vulnerability, follow these steps to submit your findings:

  • Select a Program: Choose the specific program relevant to your findings.

  • Submit Report: Click on the Submit Report button within the program details.

  • Document Findings: Provide detailed information about the vulnerability, including:

    • Affected asset

    • Weakness

    • Severity level

    • Vulnerability description

    • Impact

    • Recommendation

    • Attach any necessary supporting files.

    Ensure your report complies with Trustline's reporting guidelines before submission.

2. Cancelling a Report

If your report is in the New state and needs cancellation, you can initiate this action.

3. Adding Comments

Any user can add comments to a report, including attachments.

References

🔄Retesting Guide
📄
Page cover image