Retesting Guide
Last updated
Last updated
The retesting process for hackers on Trustline Platforms ensures the thorough validation of applied fixes to vulnerabilities identified in initial reports. This process involves receiving retest invitations, conducting retesting, and submitting retesting for evaluation.
After the initial report, certain vulnerabilities may require retesting to confirm the effectiveness of applied fixes.
1.1 Hacker Actions
Retest Invitation: When a vulnerability requires retesting, the organization sends a retest request to the hacker. Then hacker can access and review retest invitations through the platformβs Reporting page under the Retest section.
Accepting the Invitation: To proceed with the retesting process, accept the invitation.
1.2 Submission and Evaluation
Retest Submission: Following retesting, complete the retest submission form. Confirm issue reproduction and provide a summary, along with uploading necessary supporting files for evaluation.