- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 102字
- 2021-06-10 18:35:30
Commitment to researchers
This area is where the program vendors show how they will respond to researcher reports. This shows how much a program is open to accepting vulnerabilities and how much they value the researcher's feedback on their products. Generally, the program demonstrates a commitment to researchers by stipulating that they will do the following:
- Respond in a timely manner, acknowledging receipt of your vulnerability report
- Provide an ETA for considering the vulnerability report
- Investigate and consider the vulnerability report for eligibility under our bug bounty program within 30 days of submission
- Notify the researcher when the vulnerability has been fixed
推薦閱讀
- Extending Symfony2 Web Application Framework
- 數據恢復方法及案例分析
- API安全實戰
- Kali Linux Social Engineering
- Practical Network Scanning
- Preventing Digital Extortion
- Python Penetration Testing Cookbook
- Kali Linux Network Scanning Cookbook(Second Edition)
- 計算機網絡安全技術研究
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 云原生安全技術實踐指南
- 數據安全領域指南
- 網絡用戶行為的安全可信分析與控制
- 持續集成:軟件質量改進和風險降低之道
- 捍衛隱私