HackenProof Docs
search
Ctrlk
  • Welcome
    • HackenProofchevron-right
    • Integrationschevron-right
    • FAQchevron-right
    • Emergencychevron-right
    • Code of Conduct
    • Referral Program
  • Bug Bounty
    • Bug Bounty process
    • How to start Bug Bounty
    • How to create a VDP
    • Vulnerability classificationchevron-right
    • Reports Basicschevron-right
  • Dashboard
    • Company dashboardchevron-right
      • Manage programs
      • Manage reports
      • Share report
      • Labels
      • E2E report encryption
      • Reports decrypting with Mailvelope
      • Users and roles
      • Program/Report Assignee
      • Replenish your balance
      • Integrationsarrow-up-right-from-square
    • Hacker dashboardchevron-right
  • Crowdsourced audit
    • Audit process
    • How to start Audit
    • Supported tech
    • Vulnerability classification
    • Reports Basicsarrow-up-right-from-square
    • Qualified Auditors
    • Judging / Triagingchevron-right
    • [CA] Bounty Distribution Rules
    • Fee & Payments
  • DualDefense Audit
    • What is DualDefence Audit
    • General Guidelines
    • How DualDefence Audit goes
    • Contest Phases
    • Vulnerability classificationchevron-right
    • [DD] Bounty Distribution Rules
  • good to know
    • Changelog
    • Branding
    • Vulnerability Disclosure
    • National CTF
  • Education
    • Courses
    • Tools
    • Useful sources
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Dashboard

Company dashboard

Manage programschevron-rightManage reportschevron-rightShare reportchevron-rightLabelschevron-rightE2E report encryptionchevron-rightReports decrypting with Mailvelopechevron-rightUsers and roleschevron-rightProgram/Report Assigneechevron-rightReplenish your balancechevron-rightIntegrationschevron-right
PreviousCrafting a well-readable reportchevron-leftNextManage programschevron-right

Last updated 1 year ago