Page cover

🔄Retesting Guide

Overview

The retesting process for hackers on Trustline Platforms ensures the thorough validation of applied fixes to vulnerabilities identified in initial reports. This process involves receiving retest invitations, conducting retesting, and submitting retesting for evaluation.

Getting Started

1. Retesting Process

After the initial report, certain vulnerabilities may require retesting to confirm the effectiveness of applied fixes.

1.1 Hacker Actions

  • Retest Invitation: When a vulnerability requires retesting, the organization sends a retest request to the hacker. Then hacker can access and review retest invitations through the platform’s Reporting page under the Retest section.

  • Accepting the Invitation: To proceed with the retesting process, accept the invitation.

1.2 Submission and Evaluation

  • Retest Submission: Following retesting, complete the retest submission form. Confirm issue reproduction and provide a summary, along with uploading necessary supporting files for evaluation.

Last updated