🕷️Trustline Bounty Guide
Overview
Welcome to Trustline Bounty Guide for hackers. This guide provides step-by-step instructions to assist you in navigating Trustline's structured Bounty program effectively.
Getting Started
1. Accessing Bounty Programs
To begin participating in Trustline's Bounty program, follow these steps:
Navigate to Bounty Programs: Locate and navigate to the Bounty section.

2. Viewing and Managing Bounty Programs
Once in the Bounty section, manage and view active programs:
Program Details: Click on a program name for detailed information:
Policy: Program policy and bounty table.
Scope: Details of program assets including type, identifier, max severity, coverage, and bounty eligibility.
Hacktivity: Table of submitted reports showing Vulnerability type, Hacker username, submission date, Reward, and Severity.
Thanks: Leaderboard based on total points of reports, highlighting top contributors.
3. Submitting Vulnerability Findings
When you identify a vulnerability, follow these steps to submit your findings:
Check here for details on Manage Reports Guide
4. Retesting Process
Following the initial acceptance of a finding, certain vulnerabilities may require retesting to ensure the effectiveness of applied fixes. Check here for details on Retesting Guide
References
📄Manage Reports Guide🔄Retesting GuideLast updated