Page cover

🕷️Trustline Bounty Guide

Overview

Welcome to Trustline Bounty Guide for hackers. This guide provides step-by-step instructions to assist you in navigating Trustline's structured Bounty program effectively.

Getting Started

1. Accessing Bounty Programs

To begin participating in Trustline's Bounty program, follow these steps:

  • Navigate to Bounty Programs: Locate and navigate to the Bounty section.

2. Viewing and Managing Bounty Programs

Once in the Bounty section, manage and view active programs:

  • Program Details: Click on a program name for detailed information:

    • Policy: Program policy and bounty table.

    • Scope: Details of program assets including type, identifier, max severity, coverage, and bounty eligibility.

    • Hacktivity: Table of submitted reports showing Vulnerability type, Hacker username, submission date, Reward, and Severity.

    • Thanks: Leaderboard based on total points of reports, highlighting top contributors.

3. Submitting Vulnerability Findings

When you identify a vulnerability, follow these steps to submit your findings:

Check here for details on Manage Reports Guide

4. Retesting Process

Following the initial acceptance of a finding, certain vulnerabilities may require retesting to ensure the effectiveness of applied fixes. Check here for details on Retesting Guide

References

📄Manage Reports Guide🔄Retesting Guide

Last updated