Trustline Disclosure Guide
Last updated
Last updated
Welcome to the Trustline Disclosure Guide for hackers. This guide offers step-by-step instructions to assist you in navigating Trustline's structured Disclosure program process effectively.
To begin participating in Trustline's Disclosure program, follow these steps:
Navigate to Disclosure Programs: Locate and navigate to the Disclosure section.
Once in the Disclosure section, you can view active programs:
Program Details: Click on a program name to view detailed information including:
Policy: program policy.
Scope: details of the program assets which includes type, identifier, max severity, coverage, bounty eligibility.
Hacktivity: include table valid submitted reports:
Report (Vulnerability type, Hacker username and image submission date), Severity.
Thanks: leaderboard of the program ranked based on the total points of valid reports related to this program with special view for the top 3.
When you identify a vulnerability, follow these steps to submit your findings:
Check here for details on Manage Reports Guide
Following the initial acceptance of a finding, certain vulnerabilities may require retesting to ensure the effectiveness of applied fixes.
Check here for details on Retesting Guide