Welcome Edit the Doc Site Overview Program Start-Up Guide Start HackerOne Response Start HackerOne Bounty Private vs Public Programs Parent/Child Programs Using Markdown Security Page Program Metrics Response Target Indicators Top Hackers Policy and Scope Good Policies Defining Scope Scope Best Practices Asset Types Severity Environmental Score Bounty Tables Importance of Bounty Tables Submit Report Form Report Templates Pausing Report Submissions Response Targets Response Target Metrics Setting Response Targets Invitations CVE Requests Submission Signal Requirements Human-Augmented Signal Groups and Permissions Single Sign-On via SAML Google Okta OneLogin FAQs Two-Factor Authentication Invalid OTP Code Sessions Credential Management Notifications Inbox Inbox Views Report Management Report Actions Report States Quality Reports Locking Reports Duplicate Reports Exporting Reports Response Labels Keyboard Shortcuts Custom Fields Disclosure Limiting Disclosed Information Automation Common Responses Triggers Hackbot Retesting Reducing Noise Supported Integrations Integration Variables Email Forwarding Embedded Submission Form API Tokens Assembla Bugzilla Freshdesk GitHub GitLab Jira Jira Cloud Setup Jira Server Setup Multiple Integrations Jira FAQs MantisBT OTRS Phabricator ServiceNow Slack Redmine Trac Zendesk Billing Bounties Swag Bonuses Dashboards Submissions Dashboard Statistics Dashboard Hacker Feedback Dashboard Audit Logs Hacktivity Communicating with Hackers Message Hackers Banning Hackers Hacker Email Alias Hacker Mediation Hacker Reviews Disclosure Assistance Advanced Vetting Gateway FAQs Response Targets
Response targets refer to how quickly your security team will respond to a found vulnerability. The quicker your response target, the healthier and more attractive your program will be.
HackerOne’s response target features enable you to set and achieve response target times for your program. This will help you attract and maintain top hacker talent as hackers are able to quickly see if your program is fast to acknowledge, validate, and resolve submitted vulnerabilities.