🛡️Trustline Disclosure Guide
Overview
Welcome to the Trustline Disclosure Guide for hackers. This guide offers step-by-step instructions to assist you in navigating Trustline's structured Disclosure program process effectively.
Getting Started
1. Accessing Disclosure Programs
To begin participating in Trustline's Disclosure program, follow these steps:
Navigate to Disclosure Programs: Locate and navigate to the Disclosure section.

2. Viewing and Managing Disclosure Programs
Once in the Disclosure section, you can view active programs:
Program Details: Click on a program name to view detailed information including:
Policy: program policy.
Scope: details of the program assets which includes type, identifier, max severity, coverage, bounty eligibility.
Hacktivity: include table valid submitted reports:
Report (Vulnerability type, Hacker username and image submission date), Severity.
Thanks: leaderboard of the program ranked based on the total points of valid reports related to this program with special view for the top 3.
3. Submitting Vulnerability Findings
When you identify a vulnerability, follow these steps to submit your findings:
Check here for details on Manage Reports Guide
4. Retesting Process
Following the initial acceptance of a finding, certain vulnerabilities may require retesting to ensure the effectiveness of applied fixes.
Check here for details on Retesting Guide
References
📄Manage Reports Guide🔄Retesting GuideLast updated