# Bug Bounty

- [Bug Bounty process](/bug-bounty/bug-bounty-process.md)
- [How to start Bug Bounty](/bug-bounty/how-to-start-bug-bounty.md): Steps are required to start working with HackenProof
- [How to create a VDP](/bug-bounty/how-to-create-a-vdp.md): Here is an example of the iFrame of HackenProof's bug bounty program: https://hackenproof.com/embed/hacken/hackenproof.
- [Vulnerability classification](/bug-bounty/vulnerability-classification.md)
- [Web & Mobile](/bug-bounty/vulnerability-classification/web-and-mobile.md): This is a vulnerability classification table for web & mobile applications (v2.0)
- [Out-of-Scope Bugs](/bug-bounty/vulnerability-classification/web-and-mobile/out-of-scope-bugs.md)
- [Smart contracts](/bug-bounty/vulnerability-classification/smart-contracts.md): This is a vulnerability classification table for smart contracts (v2.0)
- [Blockchain protocols](/bug-bounty/vulnerability-classification/blockchain-protocols.md): This is a vulnerability classification table for blockchain protocols (v2.0)
- [Reports Basics](/bug-bounty/reports-basics.md): Here are all possible states of reports
- [Points Guide](/bug-bounty/reports-basics/points-guide.md): Executive methodology of hackers points calculation
- [Crafting a well-readable report](/bug-bounty/reports-basics/crafting-a-well-readable-report.md): This page offers a comprehensive guide to enhancing the quality of vulnerability reports.
- [Report Submission Requirements](/bug-bounty/reports-basics/report-submission-requirements.md)
