Hackers submit reports to your security team with detailed information about the security issues they have identified.
One of the most important elements of running a successful bug bounty campaign is ensuring you get high-quality reports where hackers provide you with all the information you need to verify and validate the vulnerability. You can customize the form where hackers submit their vulnerability reports.
Customizing the Report Submissions Form Page
To customize your report submissions form page:
Go to Engagements > Settings > Program > Submit Report Form.
Toggle Yes or No for these options:
Option | Details |
Accepting new report submissions | Set to Yes if you'd like to receive new report submissions. |
Accepting critical report submissions even when not accepting new reports | Even if you're not accepting new report submissions, hackers can still submit new reports if they find critical vulnerabilities in your program. Set to Yes if you're currently paused in receiving new report submissions but still want to receive critical reports. |
3. Edit these sections:
Section | Details |
Introduction Text | This text is shown at the top of the report submissions page for hackers. You can:
|
Report Template | Configure the Markdown-based report template with the information you want hackers to provide. The template will be pre-populated with your requested fields when a hacker submits a new report. The more details you provide in the template, the more you ensure that hackers are providing you with all the information you need to verify and validate the report. |
Impact Template | Configure the Markdown-based impact template with the information you want hackers to provide. The template will be pre-populated with your requested fields when a hacker submits a new report. This guides hackers to describe why the issue is important in a format that helps you best prioritize response and remediation. |
Weakness Configuration | A weakness is a type of mistake in software that introduces vulnerabilities within that software. All weaknesses are shown by default and are organized in clusters (a set of weaknesses). To edit vulnerability display preferences, click Edit and you can choose from these options:
|
4. Click Update introduction and template.