Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 3b6e990

Browse files
committed
added retesting back
1 parent b74f371 commit 3b6e990

File tree

2 files changed

+67
-0
lines changed

2 files changed

+67
-0
lines changed

docs/programs/retesting.md

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
---
2+
title: "Retesting"
3+
path: "/programs/retesting.html"
4+
id: "programs/retesting"
5+
---
6+
7+
As programs receive vulnerability reports and work on deploying fixes, they need proof that their vulnerabilities have actually been fixed. Asking hackers to verify whether a vulnerability has been fixed is a good way to secure the protection of your asset’s data. You can elect to invite hackers to retest your vulnerabilities to verify fixes. Each hacker that participates in the retest will receive a $50 bounty upon completion.
8+
9+
> Retesting is available as an add-on. To learn more about adding Retesting to your program, contact your account manager.
10+
11+
### How It Works
12+
To have hackers retest a vulnerability:
13+
1. Choose the <b><i>Resolved</i></b> report in your inbox that you want to assign hackers to retest. **Note:** Your report must be [closed and marked as Resolved](report-actions.html#close-a-report) in order to retest.
14+
15+
2. Change the action picker to <b>Request retest</b>.
16+
3. Click <b>Request retest</b>.
17+
18+
![request retest button](./images/retest_update_6a.png)
19+
20+
2 hackers participating in your program will be invited to retest the report through email.
21+
22+
![email to see retest invitation](./images/retesting_update_2.png)
23+
24+
In addition, the hacker that originally submitted the report will also be invited to participate in the retest, so that there will be a total of 3 retesters for your report.
25+
26+
![retest email for original hacker](./images/retesting-3c.png)
27+
28+
When the hacker clicks <b>View retest invitation</b> in the email, they’ll be able to <b>Accept</b> or <b>Reject</b> the invitation.
29+
30+
![retest invitation](./images/retesting-4b.png)
31+
32+
Upon acceptance, participating hackers will be able to familiarize themselves with the vulnerability report and check to see that the vulnerability is properly fixed. After they’ve tested the vulnerability, they can click the <b>answer these questions</b> link in the report banner to submit their findings.
33+
34+
![answer these questions link in banner](./images/retesting_update_3.png)
35+
36+
The hacker will be asked to answer the following questions:
37+
* Are you able to reproduce the vulnerability?
38+
* Are you able to identify a bypass to the fix?
39+
40+
![retest questionnaire](./images/retesting_update_1.png)
41+
42+
If they were able to identify a bypass, they can can submit a new vulnerability report and enter the report ID in the questionnaire.
43+
44+
![submitting a new report through retest](./images/retesting-6b.png)
45+
46+
Hackers are also asked to provide a short summary of how they retested the vulnerability, and are also able to upload any attachments of their validations.
47+
48+
![summary and screenshots](./images/retesting-6d.png)
49+
50+
Upon submission of the questionnaire, you’ll be notified that a hacker has completed a retest of your report within the report timeline and also through email.
51+
52+
![notification that hacker completed retest](./images/retest_update_5.png)
53+
54+
Click on <b>View results</b> to see the status and findings of the retest efforts. If the hacker was able to find a bypass to the vulnerability, you can view the new vulnerability report.
55+
56+
![retest results popup](./images/retesting-8.png)
57+
58+
Hackers that completed the retest will automatically be awarded $50. The payment is a regular bounty payment and the transaction for retesting will show in your billing overview statement.
59+
60+
![billing notification](./images/retesting_payment.png)
61+
62+
><i>There’s currently no effect to reputation for verifying vulnerability fixes and there’s also no time limit for hackers to complete the retest.</i>
63+
64+
### Payments
65+
You can opt-in to pay for retesting through Retest Bundles. With Retest Bundles, you can purchase a bundle of retests that can be used with your HackerOne subscription. When you use all of your retests, you can choose to purchase more. Contact your program manager to learn more about bundle options. <br><br>![retesting bundles](./images/retesting_bundles.png)

src/pages/programs/programs-nav.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,8 @@
133133
items:
134134
- title: Limiting Disclosed Information
135135
path: /programs/limiting-disclosed-information.html
136+
- title: Retesting
137+
path: /programs/retesting.html
136138
- title: Automation
137139
path: /programs/automation.html
138140
items:

0 commit comments

Comments
 (0)