Trustline Platform User Guide
Hacker Guides
Hacker Guides
  • Overview
    • 💡Quick Start
  • Trustline Products
    • 🐞Trustline Assessment Guide
      • 🏴‍☠️Apply to be a Pentester
      • ✉️Accept Invite to Assessment
      • 📝Assessment Testing
      • ⬇️Assessment Reporting
      • 🔁Assessment Remediation
      • ✔️Assessment Completion
    • 🕷️Trustline Bounty Guide
    • 🛡️Trustline Disclosure Guide
    • 🚩Trustline Challenges Guide
  • References
    • 📄Manage Reports Guide
    • 🔄Retesting Guide
    • 🏆Leaderboard and Hacktivity
      • 🎖️Trustline Leaderboard Guide
      • 🎯Trustline Hacktivity Guide
    • 🥇Trustline Point System
Powered by GitBook
On this page
  • Overview
  • Getting Started
  • 1. Accessing Bounty Programs
  • 2. Viewing and Managing Bounty Programs
  • 3. Submitting Vulnerability Findings
  • 4. Retesting Process
  • References
  1. Trustline Products

Trustline Bounty Guide

PreviousAssessment CompletionNextTrustline Disclosure Guide

Last updated 9 months ago

Overview

Welcome to Trustline Bounty Guide for hackers. This guide provides step-by-step instructions to assist you in navigating Trustline's structured Bounty program effectively.

Getting Started

1. Accessing Bounty Programs

To begin participating in Trustline's Bounty program, follow these steps:

  • Navigate to Bounty Programs: Locate and navigate to the Bounty section.

2. Viewing and Managing Bounty Programs

Once in the Bounty section, manage and view active programs:

  • Program Details: Click on a program name for detailed information:

    • Policy: Program policy and bounty table.

    • Scope: Details of program assets including type, identifier, max severity, coverage, and bounty eligibility.

    • Hacktivity: Table of submitted reports showing Vulnerability type, Hacker username, submission date, Reward, and Severity.

    • Thanks: Leaderboard based on total points of reports, highlighting top contributors.

3. Submitting Vulnerability Findings

When you identify a vulnerability, follow these steps to submit your findings:

Check here for details on Manage Reports Guide

4. Retesting Process

Following the initial acceptance of a finding, certain vulnerabilities may require retesting to ensure the effectiveness of applied fixes. Check here for details on Retesting Guide

References

📄Manage Reports Guide
🔄Retesting Guide
🕷️
Page cover image