Submissions Dashboard

Organizations: Metrics on hacker submissions for multiple engagements in your organization

Updated over a week ago

The Submissions Dashboard shows metrics on hacker submissions for multiple engagements of your organization on the HackerOne platform, including bug bounty, vulnerability disclosure, challenges, and Assessments (pentest) programs. You can export all of your data together as a PDF or by sections as a CSV, PDF, or PNG image file. Analytics on payments, including bounty, is now shown on the Rewards dashboard.

Note: Analytics is available at (a) a program-level from the Engagements page for your organization, and (b) org-level, across multiple programs in your organization, by clicking on the left-side Analytics icon.

Submissions and Submissions by Severity

The Submissions chart shows the number of valid submissions during the selected time period compared to the average for all HackerOne customers. The Submissions by Severity chart shows how reports are distributed by severity levels. Apply the filters at the top of the page to review this data by date range or assets.

Submissions by Weakness and by Asset

The Submissions by weakness chart shows how your reports are spread among the different weakness types. You can view what areas you’re receiving the most valid vulnerabilities in to see which issues your program is most susceptible to.

submissions by weakness or asset bar graphs

The Submissions by asset chart enables you to explore hacker reports by asset over time. You can use the filters described at the top of this page to add/remove assets to analyze the data further.

Top Weaknesses by Submission Count

This chart provides an overview of the top weaknesses in your program(s). This can help as a baseline for weakness identification, mitigation, and prevention efforts. It can be used to focus application developer training and improve secure coding practices.

top weaknesses by submission

Submissions by Number of Collaborators

This chart shows how many reports were submitted by individual hackers versus multiple hackers collaborating. In conjunction with the Collaborators table, it provides a richer understanding of your hacker population and can help you make informed decisions about who to invite to a campaign.

To view the Collaborators table, click the Submissions by Number of Collaborators chart and scroll down the page to view the table.

submissions by number of collaborators chart

Top Reports with Duplicates

This chart shows reports with the highest number of associated duplicate reports (as marked in the inbox). This can help evaluate risk and determine the priority of remediation. In some cases, a report with a high duplicate number should be addressed early, even if it’s not the most severe.

Top reports with duplicates chart

Did this answer your question?