Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 5a8831a

Browse files
committed
Merge branch 'master' of github.com:Hacker0x01/docs.hackerone.com
2 parents 905e8bb + e18c533 commit 5a8831a

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+684
-665
lines changed

docs/hackers/calendar.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ To add your HackerOne calendar to your personal calendar:
1919
3. Click **Copy** to copy the URL.
2020
4. Import your HackerOne calendar URL to your personal calendar in [iCal](#iCal) or [Google Calendar](#Google).
2121

22-
You can choose to regenerate your calendar URL by clicking **Regenerate**. Keep in mind that if you regenerate your URL, your calendar on the old URL won't be updated with new events. Only the current URL will be actively synced with new events.
22+
You can choose to regenerate your calendar URL by clicking **Regenerate**. Keep in mind that if you regenerate your URL, your calendar on the old URL won't be updated with new events. Only the current URL will be actively synced with new events.
2323

24-
<h3 id="iCal">Importing to iCal</h3>
24+
### Importing to iCal
2525

2626
1. Go to **File > New Calendar Subscription** in Calendar.
2727

@@ -35,7 +35,7 @@ You can choose to regenerate your calendar URL by clicking **Regenerate**. Keep
3535
4. Choose how frequently you want to refresh the events in the **Auto Refresh** field.
3636
5. Click **OK**.
3737

38-
<h3 id="Google">Importing to Google Calendar</h3>
38+
### Importing to Google Calendar
3939

4040
1. Open [Google Calendar](https://calendar.google.com/).
4141
2. Add a new calendar by selecting **From URL**.

docs/hackers/configure-the-hackerone-vpn.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ To configure the HackerOne VPN:
1414
2. Download your VPN Credentials from HackerOne (See: <i>Accessing your VPN Credentials</i> below)
1515
3. [Configure your OpenVPN Client](/hackers/openvpn-clients.html).
1616

17-
<h3 id="accessing">Accessing your VPN Credentials</h3>
17+
### Accessing your VPN Credentials
1818

1919
Once you've configured the HackerOne VPN and accepted an invitation to a VPN enabled program, to access your VPN Credentials:
2020

docs/hackers/directory.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,7 @@ The Directory is a community-curated resource that helps hackers identify the be
1717

1818
![revamped directory page](./images/better-directory-5.png)
1919

20-
<div class="background contents" markdown="1">
21-
22-
In this article you can learn about:|
23-
----------------------------------- |
24-
[Directory services](#services)|
25-
[What's on the Directory](#what's)|
26-
[Directory filters](#filters)|
27-
</div>
28-
29-
<h3 id="services">Directory Services</h3>
20+
### Directory Services
3021
The Directory provides relevant information for both hackers and programs.
3122

3223
The Directory enables Hackers to:
@@ -43,7 +34,7 @@ The Directory enables programs to:
4334
* Publish contact information for receiving information about potential vulnerabilities in their products or online services, such as a security@ email address or a HackerOne program (See [ISO 29147](http://www.iso.org/iso/catalogue_detail.htm?csnumber=45170) for additional guidance or [contact HackerOne](mailto:[email protected]))
4435
* [Search](https://hackerone.com/directory) for their organization to ensure that their security team's contact information and disclosure policy is accurate (See [Claiming the Security Page](/programs/security-page.html) if the program page hasn’t been claimed for editing)
4536

46-
<h3 id="what's">What's on the Directory</h3>
37+
### What's on the Directory
4738
You can find this information associated with an organization on the directory:
4839

4940
Option | Detail
@@ -57,7 +48,7 @@ Star Icon<br>![star icon](./images/better-directory-4.png) | Bookmark your favor
5748
Managed Icon<br>![managed icon](./images/better-directory-2.png) | Programs managed by HackerOne. These programs are more likely to respond quickly to your report and there's a higher likelihood of being successful on these programs because it's managed by the HackerOne triage team.
5849
Not Accepting Submissions Icon<br>![not accepting submissions icon](./images/better-directory-3.png) | A program that isn’t accepting any report submissions on HackerOne.
5950

60-
<h3 id="filters">Directory Filters</h3>
51+
### Directory Filters
6152
You can filter your list of programs by both program features and by asset type.
6253

6354
The program features you can filter include:

docs/hackers/disclosure.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -24,16 +24,7 @@ Disclosure by Default | You or the security team can request disclosure for any
2424
Disclosure requiring Mutual Agreement | You can request disclosure for any closed report in the program. If the program security team agrees to disclosure, the contents of the report will be made public. If the security team doesn't take any action, the contents of the report will remain private. <br><br>*The program must request to opt-in to this option.*
2525
Disclosure Disabled | Disclosure isn't allowed for any report.
2626

27-
<div class="background contents" markdown="1">
28-
29-
In this article, you can learn about: |
30-
------------------------------------- |
31-
[Requesting Disclosure](#requesting) |
32-
[Canceling Disclosure Requests](#canceling) |
33-
[Disclosure for Private Programs](#disclosure) |
34-
</div>
35-
36-
<h3 id="requesting">Requesting Disclosure</h3>
27+
### Requesting Disclosure
3728

3829
Both you and program members can request for disclosure. To request for disclosure:
3930
1. Go to the report you want to disclose.
@@ -58,7 +49,7 @@ After public disclosure has been requested, the admin of the of the program can
5849

5950
When publishing reports, the security team can choose to disclose the report in full or limit the information published. The default is to display all the communication between the hacker and the security team from first report to resolution.
6051

61-
<h3 id="canceling">Canceling Disclosure Requests</h3>
52+
### Canceling Disclosure Requests
6253

6354
You can cancel your disclosure request if you later decide to not disclose your report. You can also cancel disclosure requests from a program asking you for disclosure.
6455

@@ -71,7 +62,7 @@ To cancel a disclosure request:
7162
3. Enter a comment explaining why you are canceling the disclosure request.
7263
4. Click **Post**.
7364

74-
<h3 id="disclosure">Disclosure for Private Programs</h3>
65+
### Disclosure for Private Programs
7566

7667
Private programs can also enable you to disclose a report to other hackers within the program. Upon disclosure, contents of the report will only be visible to other hackers in the private program. This enables you and other hackers to share your vulnerability findings with other hackers in the program so that they can be aware of what vulnerabilities have been found for that program.
7768

docs/hackers/hacker-dashboard.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,7 @@ id: "hackers/hacker-dashboard"
1515

1616
The Hacker Dashboard enables you to view and manage all of your invitations.
1717

18-
<div class="background contents" markdown="1">
19-
20-
There are 4 tabs that you can view on the dashboard:|
21-
--------------------------------------------------- |
22-
[Overview](#overview) |
23-
[My Programs](#programs) |
24-
[Pending Invitations](#pending) |
25-
[Bookmarked Programs](#bookmarked) |
26-
</div>
27-
28-
<h3 id="overview">Overview</h3>
18+
### Overview
2919

3020
The Overview page is your guide to help you get started on HackerOne. You'll be directed to the right pages to help you get the information you need to successfully start out on HackerOne.
3121

@@ -37,7 +27,7 @@ After you've submitted your first vulnerability, you'll be able to keep track of
3727

3828
![hacker dashboard statistics](./images/hacker-stats-v2.png)
3929

40-
<h3 id="programs">My Programs</h3>
30+
### My Programs
4131

4232
![hacker dashboard my programs](./images/hacker-dashboard-my-programs.png)
4333

@@ -51,7 +41,7 @@ For each program, you can view:
5141

5242
You can elect to leave the private programs that you no longer have interest to participate in by clicking **Leave Program** next to the program you want to leave.
5343

54-
<h3 id="pending">Pending Invitations</h3>
44+
### Pending Invitations
5545

5646
![hacker dashboard pending invitations](./images/hacker-dashboard-2.png)
5747

@@ -70,7 +60,7 @@ Average Bounty | The average bounty that will be given for a valid vulnerability
7060

7161
Click <b>View Invitation</b> to review the invitation and take action to accept or reject it.
7262

73-
<h3 id="bookmarked">Bookmarked Programs</h3>
63+
### Bookmarked Programs
7464

7565
The Bookmarked Programs tab enables you to view the list of programs that you've marked as your favorites in the directory. This enables you to better keep track of the programs you're most interested in.
7666

docs/hackers/hackerone-vpn-root-ca.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Refer to these installation and configuration instructions for your platform:
1515

1616
><i>Note: Firefox manages its own trusted certificate list, so you always need to add the root authority certificate to the browser even if you've installed it system wide.</i>
1717
18-
<h3 id="windows">Windows</h3>
18+
### Windows
1919

2020
To install the HackerOne VPN Root CA to your Windows machine:
2121

@@ -48,7 +48,7 @@ To install the HackerOne VPN Root CA to your Windows machine:
4848

4949
![Screenshot](./images/vpn-windows-7.png)
5050

51-
<h3 id="macos">macOS</h3>
51+
### macOS
5252

5353
To install the HackerOne VPN Root CA to your macOS platform:
5454

@@ -73,7 +73,7 @@ To install the HackerOne VPN Root CA to your macOS platform:
7373

7474
![Screenshot](./images/vpn-macos-5.png)
7575

76-
<h3 id="ubuntu">Ubuntu/Debian Linux</h3>
76+
### Ubuntu/Debian Linux
7777

7878
Execute the following commands in your terminal to download and install the HackerOne VPN Root CA:
7979

@@ -83,7 +83,7 @@ Execute the following commands in your terminal to download and install the Hack
8383

8484
The command will state that it has installed one (or more) new certificates, through which the certificate has been successfully added to the Operating System.
8585

86-
<h3 id="firefox">Firefox</h3>
86+
### Firefox
8787

8888
To install the HackerOne VPN Root CA to Firefox:
8989

docs/hackers/openvpn-clients.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Refer to these installation and configuration instructions for your platform:
1111
* [Windows](#windows)
1212
* [macOS](#macos)
1313

14-
<h3 id="windows">Windows</h3>
14+
### Windows
1515

1616
To configure the OpenVPN client to your windows machine:
1717

@@ -50,7 +50,7 @@ To configure the OpenVPN client to your windows machine:
5050

5151
The VPN will start connecting.
5252

53-
<h3 id="macos">macOS</h3>
53+
### macOS
5454

5555
To configure the OpenVPN client on macOS:
5656

docs/hackers/payments.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,7 @@ id: "hackers/payments"
1313
}
1414
</style>
1515

16-
<div class="background contents" markdown="1">
17-
18-
You can receive payments on HackerOne for finding and reporting valid vulnerabilities in the form of: |
19-
----------------------------------------------------------------------------------------------------- |
20-
[Bounties](#bounties) |
21-
[Swag](#swag) |
22-
[Bonuses](#bonuses) |
23-
</div>
24-
25-
<h3 id="bounties">Bounties</h3>
16+
### Bounties
2617

2718
A bounty is money you get rewarded with for reported and resolved bugs. They're used to attract the best hackers and to keep them incentivized to hack their programs. Bounties are used to encourage you to focus on particular assets by altering the reward amount for different vulnerability types. You won't get rewarded for every report you send in, but only for useful, valid reports.
2819

@@ -65,12 +56,12 @@ Generally, if the charity accepts donations in USD through PayPal or Credit Card
6556

6657
Keep in mind that you still need to have a valid tax form on file in order to donate your bounty. At this time, we can only donate bounties in full as we can't do partial or split donations.
6758

68-
<h3 id="swag">Swag</h3>
59+
### Swag
6960

7061
Your program can elect to award you with various swag in addition to or instead of bounties. Swag includes merchandise as well as free coupons or vouchers for the services or products the program offers. Some programs also offer to host hackers near their office or cover admissions fees to conferences you're invited to attend.
7162

7263
The program is responsible for fulfillment and delivery of swag to you.
7364

74-
<h3 id="bonuses">Bonuses</h3>
65+
### Bonuses
7566

7667
Programs can award bonuses to recognize hackers for positive actions beyond finding valid vulnerabilities. Bonuses enable programs to offer more flexible incentives without increasing the market rate for bounties.

docs/hackers/using-markdown.md

Lines changed: 11 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -15,23 +15,7 @@ id: "hackers/using-markdown"
1515

1616
HackerOne supports markdown syntax on reports, profiles, and security pages.
1717

18-
<div class="background contents" markdown="1">
19-
20-
Learn to format these in markdown:|
21-
--------------------------------- |
22-
[Headers](#headers) |
23-
[Blockquotes](#blockquotes) |
24-
[Text Emphasis](#text) |
25-
[Lists](#lists) |
26-
[Links](#links) |
27-
[Code](#code) |
28-
[User Mentions](#user) |
29-
[Report References](#report) |
30-
[Attachment References](#attachment) |
31-
[Inline Images and Videos](#inline) |
32-
</div>
33-
34-
<h3 id="headers">HEADERS</h3>
18+
### Headers
3519

3620
Markdown Input:
3721

@@ -49,7 +33,7 @@ Output:
4933

5034
![headers](./images/markdown-headers.png)
5135

52-
<h3 id="blockquotes">BLOCKQUOTES</h3>
36+
### Blockquotes
5337

5438
Markdown Input:
5539

@@ -63,7 +47,8 @@ Output:
6347
![blockquotes](./images/markdown-blockquote.png)
6448

6549
<br>
66-
<h3 id="text">TEXT EMPHASIS</h3>
50+
51+
### Text emphasis
6752

6853
Markdown Input:
6954

@@ -80,7 +65,7 @@ Output:
8065
![text emphasis output](./images/markdown-5.png)
8166

8267

83-
<h3 id="lists">LISTS</h3>
68+
### Lists
8469

8570
#### Unordered Lists
8671

@@ -138,7 +123,7 @@ If you put blank lines between items, you’ll get `<p>` tags for the list item
138123

139124
![multiple](./images/markdown-multiple.png)
140125

141-
<h3 id="links">LINKS</h3>
126+
### Links
142127

143128
Markdown supports two styles for creating links: *inline* and *reference*. With both styles, you use square brackets to delimit the text you want to turn into a link.
144129

@@ -194,7 +179,7 @@ Output:
194179
#### Email Links
195180
You don't need to use markdown to create a `mailto:` link. Simply enter the email as is and it will automatically be converted to a `mailto:` link.
196181

197-
<h3 id="code">CODE</h3>
182+
### Code
198183

199184
In a regular paragraph, you can create code span by wrapping text in back tick quotes. Any ampersands (&) and angle brackets (< or >) will automatically be translated into HTML entities. This makes it easy to use Markdown to write about HTML example code.
200185

@@ -233,7 +218,7 @@ Output:
233218

234219
Go to the following web page to see which content types are available for syntax highlighting: https://github.com/jneen/rouge/tree/master/lib/rouge/demos.
235220

236-
<h3 id="user">USER MENTIONS</h3>
221+
### User mentions
237222
You can mention a user by prefixing username with '@' symbol
238223

239224
Markdown Input:
@@ -249,15 +234,15 @@ Output:
249234

250235
<br>
251236

252-
<h3 id="report">REPORT REFERENCES</h3>
237+
### Report reference
253238

254239
You can reference a report by prefixing report id with '#' symbol
255240
```
256241
#105887 is a publicly disclosed bug
257242
```
258243
[#105887](https://hackerone.com/reports/105887) is a publicly disclosed bug
259244

260-
<h3 id="attachment">ATTACHMENT REFERENCES</h3>
245+
### Attachment references
261246

262247
You can reference an attachment while writing reports, comments in reports and report summary. You can do this by writing 'F' followed by attachment id (F). The attachment id is displayed before the attachment name once the upload is successful.
263248

@@ -270,7 +255,7 @@ Now you can reference the attachment in the report by writing 'F1' and the attac
270255
When the link is clicked, the attachment is displayed in the modal.
271256
![markdown-3](./images/markdown-3.png)
272257

273-
<h3 id="inline">INLINE IMAGES AND VIDEOS</h3>
258+
### Inline images and video
274259

275260
You can inline images and videos in the report description, comments and report summary by writing the attachment reference id within curly braces (as in {F:id}).
276261

docs/programs/bounties.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,7 @@ id: "programs/bounties"
1515

1616
A bounty is money you reward to hackers for reported and resolved bugs. They're used to attract the best hackers and to keep them incentivized to hack your programs. You can use bounties to encourage hackers to focus on particular assets by altering the reward amount for different vulnerability types. You shouldn't feel obligated to award a bounty for every incoming report as it's best to only reward for useful, valid reports.
1717

18-
<div class="background contents" markdown="1">
19-
20-
In this article, you can learn about: |
21-
---------------------------------- |
22-
[Awarding Bounties on Reports](#awarding) |
23-
[Suggesting Bounties](#suggesting) |
24-
[Best Practices](#best) |
25-
[Bounties for Reports Received Outside of HackerOne](#bounties) |
26-
</div>
27-
28-
<h3 id="awarding">Awarding Bounties on Reports</h3>
18+
### Awarding Bounties on Reports
2919

3020
You can award a bounty through any report submitted to HackerOne. Some teams prefer to award a bounty once the issue has been confirmed as valid, while others wait until the issue is resolved.
3121

@@ -39,7 +29,7 @@ To award a bounty:
3929

4030
Bounty amounts can be increased at any point by setting another award on the report, but keep in mind that bounties can't be removed once awarded.
4131

42-
<h3 id="suggesting">Suggesting Bounties</h3>
32+
### Suggesting Bounties
4333

4434
If you're unsure of how much to award the hacker, you can communicate a suggested amount with your internal team. To suggest an amount:
4535
1. Go to your inbox and open the report you'd like to award a bounty for.
@@ -53,7 +43,7 @@ If you're unsure of how much to award the hacker, you can communicate a suggeste
5343
6. <i>(Optional)</i> Enter your reason of why you suggest that bounty amount.
5444
6. Click **Suggest award**.
5545

56-
<h3 id="best">Best Practices</h3>
46+
### Best Practices
5747

5848
Here are some best practices to follow when awarding bounties:
5949
* Provide bounties for useful, valid reports.
@@ -62,7 +52,7 @@ Here are some best practices to follow when awarding bounties:
6252

6353
><i>Note: Professional, Enterprise, and Fully Managed programs have access to a HackerOne representative who can provide insight and consult them through the bounty awarding process.</i>
6454
65-
<h3 id="bounties">Bounties for Reports Received Outside of HackerOne</h3>
55+
### Bounties for Reports Received Outside of HackerOne
6656

6757
When hackers submit vulnerabilities to your organization outside of HackerOne, you can leverage the HackerOne API to award hackers for their efforts. To start paying hackers, generate an API token on your Program settings page. Keep in mind that this API endpoint is not for awarding bounties for reports on HackerOne itself, but only for reports that were reported outside of HackerOne.
6858

0 commit comments

Comments
 (0)