Trustline Bounty Guide
Last updated
Last updated
Welcome to Trustline Bounty Guide for hackers. This guide provides step-by-step instructions to assist you in navigating Trustline's structured Bounty program effectively.
To begin participating in Trustline's Bounty program, follow these steps:
Navigate to Bounty Programs: Locate and navigate to the Bounty section.
Once in the Bounty section, manage and view active programs:
Program Details: Click on a program name for detailed information:
Policy: Program policy and bounty table.
Scope: Details of program assets including type, identifier, max severity, coverage, and bounty eligibility.
Hacktivity: Table of submitted reports showing Vulnerability type, Hacker username, submission date, Reward, and Severity.
Thanks: Leaderboard based on total points of reports, highlighting top contributors.
When you identify a vulnerability, follow these steps to submit your findings:
Check here for details on Manage Reports Guide
Following the initial acceptance of a finding, certain vulnerabilities may require retesting to ensure the effectiveness of applied fixes. Check here for details on Retesting Guide