Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 2eeaaba

Browse files
committed
s/Hackerone/HackerOne/
1 parent 845b1ec commit 2eeaaba

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

docs/programs/pentest-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,6 @@ Can I incentivize pentesters to find vulnerabilities throughout the pentest proc
1111
Can pentesters test for apps that require specialization? | It depends on the specialization you’re looking for. We have pentesters with experience in web, mobile, API and external network/infra testing. As part of the pentest process, we ask customers to go through a scoping questionnaire to help inform our team on specific testing requirements.
1212
We want to avoid the possibility of finding a high number of vulnerabilities that could cause our bounty pool to balloon. What can we do to avoid that? | The HackerOne Pentest is set at a fixed cost. Given there are no bounties, and pentesters are compensated for their effort and time, the total cost is 100% fixed and predictable.
1313
Is retesting included? How much is it to add? | There is a 60-day window to initiate 2 retests per report at no additional cost. Retesting is handled by the pentest team to ensure accuracy and consistency.
14-
Are these pentests conducted by Hackerone staff or are they crowdsourced? | Pentesters are not HackerOne employees. Tests are conducted by our community. We have identified in our community those with existing professional pentesting experience.
14+
Are these pentests conducted by HackerOne staff or are they crowdsourced? | Pentesters are not HackerOne employees. Tests are conducted by our community. We have identified in our community those with existing professional pentesting experience.
1515
We're looking for something that indicates that we had the assessment done and the status of the application at the end of the assessment retest period, without the detail for issues that were identified and corrected. Can you produce an abridged version with that information? | Yes, we offer a letter of attestation for our pentest assessments.
1616
I’m frustrated with traditional pentest firms including out-of-scope or insignificant vulnerabilities in reports. We have to explain these to customers and leadership all the time. Will the HackerOne pentest be different? | Pentesters look for coverage of the scope rather than just focusing on impactful vulnerabilities as in a bug bounty program. Pentest best practices call for low and informative vulnerabilities to be reported. OWASP guidelines are followed by pentesters in web and mobile applications. <br><br>HackerOne’s bug bounty offerings may be more suitable for you if your priority is to find the most impactful and critical bugs.

docs/programs/product-offerings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,12 @@ HackerOne offers 5 different products that you can choose from:
1414
* HackerOne Pentests
1515

1616
### HackerOne Response
17-
Establish an ISO 29147 compliant disclosure policy to safely receive and act on vulnerabilities discovered by external third-parties. This welcomes a "See Something, Say Something" process that helps ensure that security reports end up with your security team instead of unreliable channels like social media.
17+
Establish an ISO 29147 compliant disclosure policy to safely receive and act on vulnerabilities discovered by external third-parties. This welcomes a "See Something, Say Something" process that helps ensure that security reports end up with your security team instead of unreliable channels like social media.
1818

1919
![overview-2](./images/overview-2.png)
2020

2121
### HackerOne Challenge
22-
A private, project-based, and time-bound vulnerability assessment program. Challenges are perfect for organizations looking to supplement or replace traditional penetration tests with ethical hackers looking for severe vulnerabilities. Every Challenge includes a detailed report to help meet compliance requirements.
22+
A private, project-based, and time-bound vulnerability assessment program. Challenges are perfect for organizations looking to supplement or replace traditional penetration tests with ethical hackers looking for severe vulnerabilities. Every Challenge includes a detailed report to help meet compliance requirements.
2323

2424
![overview-1](./images/overview-1.png)
2525

docs/programs/slack-shared-channels.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You can join HackerOne’s Customer Slack workspace (https://hackerone-customer.
2222

2323
> **Note:** It’s your responsibility to inform HackerOne in a timely manner when a member’s access is to be revoked.
2424
25-
To join Hackerone’s Slack workspace as a guest:
25+
To join HackerOne’s Slack workspace as a guest:
2626
1. Click the Join Now button in your Slack invitation email.
2727

2828
![Join HackerOne on Slack screen](./images/slack-shared-channels-1.png)

0 commit comments

Comments
 (0)