Trustline Platform User Guide
Hacker Guides
Hacker Guides
  • Overview
    • πŸ’‘Quick Start
  • Trustline Products
    • 🐞Trustline Assessment Guide
      • πŸ΄β€β˜ οΈApply to be a Pentester
      • βœ‰οΈAccept Invite to Assessment
      • πŸ“Assessment Testing
      • ⬇️Assessment Reporting
      • πŸ”Assessment Remediation
      • βœ”οΈAssessment Completion
    • πŸ•·οΈTrustline Bounty Guide
    • πŸ›‘οΈTrustline Disclosure Guide
    • 🚩Trustline Challenges Guide
  • References
    • πŸ“„Manage Reports Guide
    • πŸ”„Retesting Guide
    • πŸ†Leaderboard and Hacktivity
      • πŸŽ–οΈTrustline Leaderboard Guide
      • 🎯Trustline Hacktivity Guide
    • πŸ₯‡Trustline Point System
Powered by GitBook
On this page
  • Overview
  • Getting Started
  • 1. Retesting Process
  1. References

Retesting Guide

PreviousManage Reports GuideNextLeaderboard and Hacktivity

Last updated 9 months ago

Overview

The retesting process for hackers on Trustline Platforms ensures the thorough validation of applied fixes to vulnerabilities identified in initial reports. This process involves receiving retest invitations, conducting retesting, and submitting retesting for evaluation.

Getting Started

1. Retesting Process

After the initial report, certain vulnerabilities may require retesting to confirm the effectiveness of applied fixes.

1.1 Hacker Actions

  • Retest Invitation: When a vulnerability requires retesting, the organization sends a retest request to the hacker. Then hacker can access and review retest invitations through the platform’s Reporting page under the Retest section.

  • Accepting the Invitation: To proceed with the retesting process, accept the invitation.

1.2 Submission and Evaluation

  • Retest Submission: Following retesting, complete the retest submission form. Confirm issue reproduction and provide a summary, along with uploading necessary supporting files for evaluation.

πŸ”„
Page cover image