Trustline Platform User Guide
Hacker Guides
Hacker Guides
  • Overview
    • 💡Quick Start
  • Trustline Products
    • 🐞Trustline Assessment Guide
      • 🏴‍☠️Apply to be a Pentester
      • ✉️Accept Invite to Assessment
      • 📝Assessment Testing
      • ⬇️Assessment Reporting
      • 🔁Assessment Remediation
      • ✔️Assessment Completion
    • 🕷️Trustline Bounty Guide
    • 🛡️Trustline Disclosure Guide
    • 🚩Trustline Challenges Guide
  • References
    • 📄Manage Reports Guide
    • 🔄Retesting Guide
    • 🏆Leaderboard and Hacktivity
      • 🎖️Trustline Leaderboard Guide
      • 🎯Trustline Hacktivity Guide
    • 🥇Trustline Point System
Powered by GitBook
On this page
  • Overview
  • Getting Started
  • 1. Accessing Disclosure Programs
  • 2. Viewing and Managing Disclosure Programs
  • 3. Submitting Vulnerability Findings
  • 4. Retesting Process
  • References
  1. Trustline Products

Trustline Disclosure Guide

PreviousTrustline Bounty GuideNextTrustline Challenges Guide

Last updated 9 months ago

Overview

Welcome to the Trustline Disclosure Guide for hackers. This guide offers step-by-step instructions to assist you in navigating Trustline's structured Disclosure program process effectively.

Getting Started

1. Accessing Disclosure Programs

To begin participating in Trustline's Disclosure program, follow these steps:

  • Navigate to Disclosure Programs: Locate and navigate to the Disclosure section.

2. Viewing and Managing Disclosure Programs

Once in the Disclosure section, you can view active programs:

  • Program Details: Click on a program name to view detailed information including:

    • Policy: program policy.

    • Scope: details of the program assets which includes type, identifier, max severity, coverage, bounty eligibility.

    • Hacktivity: include table valid submitted reports:

      • Report (Vulnerability type, Hacker username and image submission date), Severity.

    • Thanks: leaderboard of the program ranked based on the total points of valid reports related to this program with special view for the top 3.

3. Submitting Vulnerability Findings

When you identify a vulnerability, follow these steps to submit your findings:

Check here for details on Manage Reports Guide

4. Retesting Process

Following the initial acceptance of a finding, certain vulnerabilities may require retesting to ensure the effectiveness of applied fixes.

Check here for details on Retesting Guide

References

📄Manage Reports Guide
🔄Retesting Guide
🛡️
Page cover image