HackenProof Docs
  • Welcome
    • HackenProof
      • Services we provide
      • Our resources
    • Integrations
      • Slack
      • Discord
      • Telegram
      • Zapier (Webhook)
        • Zapier -> Lark
        • Zapier -> Linear
        • Zapier -> Jira Service Management
        • Zapier -> PagerDuty
        • Zapier -> Google Chat
        • Zapier -> ClickUp
      • Jira Software
      • GitHub Issue
      • GitLab Issue
      • VDP iFrame
    • FAQ
      • Audit & Bug Bounty (BB)
      • Crowdsourced Audit & BB
      • Penetration testing & BB
    • Emergency
      • Reset 2FA
    • Code of Conduct
    • Referral Program
  • Bug Bounty
    • Bug Bounty process
    • How to start Bug Bounty
    • How to create a VDP
    • Vulnerability classification
      • Web & Mobile
        • Out-of-Scope Bugs
      • Smart contracts
      • Blockchain protocols
    • Reports Basics
      • Points Guide
      • Crafting a well-readable report
  • Dashboard
    • Company dashboard
      • Manage programs
      • Manage reports
      • Share report
      • Labels
      • E2E report encryption
      • Reports decrypting with Mailvelope
      • Users and roles
      • Program/Report Assignee
      • Replenish your balance
      • Integrations
    • Hacker dashboard
      • 👉How to start
      • Submit a report
      • Reports Basics
      • Vulnerability classification
      • 👮‍♂️KYC
      • Сreate a crypto wallet
      • 💸Withdraw bounty
      • Hacker Leaderboard
      • Reset 2FA
      • 🍕HackenProof community
      • Report ID
      • Private Program
      • Contact support
    • Company-Auditor dashboard
      • How to start
      • Add members
      • Submit report
      • Contact support
  • Crowdsourced audit
    • Audit process
    • How to start Audit
    • Supported tech
    • Vulnerability classification
    • Reports Basics
    • Qualified Auditors
    • Judging / Triaging
      • Targets
      • Team
    • Fee & Payments
  • DualDefense Audit
    • What is DualDefence Audit
    • How DualDefence Audit goes
    • DualDefence Audit — researchers' perspective
  • good to know
    • Changelog
    • Branding
    • Vulnerability Disclosure
  • Education
    • Courses
    • Tools
    • Useful sources
Powered by GitBook
On this page
  • Good to know
  • Quick start
  • Steps to start a bug bounty
  1. Bug Bounty

How to start Bug Bounty

Steps are required to start working with HackenProof

PreviousBug Bounty processNextHow to create a VDP

Last updated 10 months ago

Thanks for choosing HackenProof as your platform for getting vulnerability reports! Our ethical hackers' community will help you to avoid hacks.

Good to know

You can run bug bounty with any range of bounty, but the larger the range of bounty the higher the chance that a hacker will be motivated to participate in your program but not exploit the issue.

What do we need from you to run a bug bounty? Program policy that will include: Scope-targets, a Range of bounties, Rules, and a signed agreement & NDA (we will help you with all these things)

Quick start

If you want to skip all steps below welcome to or to get everything as soon as possible (we're available 24/7 for you)

Steps to start a bug bounty

Here are the steps that need to do to start working with HackenProof:

  • Create an account . Please use your company domain to register a company account

  • Verify your email. Follow the steps in the email to confirm your email address.

  • Create a new program or edit available templates. You can customize templates and specify your targets, range of bounty, logos, and rules. Here is how to create a well-readable bug bounty program

  • Send your program for review by HackenProof. As soon as you finish your program editing you need to press the PUBLISH button.

As a result, the HackenProof team will get an instant notification and will review the created draft.

  • Marketing. As soon as you start we will prepare banners and blogs for social media advertising and to reach our hackers community.

Sign legal docs: or to sign the NDA & Agreement

Check your program. As soon as your program is approved you can check the public program list to find yours: . If your program is alive, you will need to .

Did we miss something? please leave feedback

book the call
write us in telegram
https://hackenproof.com/programs
start managing your program and its reports
https://t.co/y30nURfq4b
book the call
write us in telegram
here
press the PUBLISH button to send the program to review