Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 5bc15e7

Browse files
Merge branch 'master' into martijnrusschen-patch-8
2 parents 06820f1 + 013adc5 commit 5bc15e7

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

74 files changed

+7167
-23550
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This repo contains the source code and documentation powering [docs.hackerone.co
2121

2222
### Running locally
2323

24-
1. `gatsby develop` to start the hot-reloading development server (powered by [Gatsby](https://www.gatsbyjs.org))
24+
1. `yarn run gatsby develop` to start the hot-reloading development server (powered by [Gatsby](https://www.gatsbyjs.org))
2525
1. `open http://localhost:8000` to open the site in your favorite browser
2626

2727
### Deploy

docs/changelog/2018/august.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ date: "2018-08"
66

77
### Publishing External Vulnerabilities
88
We now enable hackers to publish their findings from external sources that don't have HackerOne programs. Click [here](/hackers/publishing-external-vulnerabilities.html) to learn more.
9-
![aug-2018-publishing](./images/aug-2018-hacktivity++.png)
9+
![aug-2018-publishing](./images/aug-2018-hacktivity-plus-plus.png)
1010

1111
### Two-Factor Authentication
1212
Hackers now have the ability to set up [two-factor authentication](/hackers/two-factor-authentication.html) to add an extra layer of protection to their accounts.

docs/changelog/2018/march.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Reports in the Needs More Info state that haven’t been responded to within 30
1919

2020
### Self-Controlled Launch
2121
Response Programs in Controlled Launch that meet all of the success criteria are now prompted to publicly launch their own program through following the Setup Guide or through email notification.
22-
![march_2018_controlled_launch](./images/march_2018_controlled%20launch.png)
22+
![march_2018_controlled_launch](./images/march_2018_controlled_launch.png)
2323

2424
### Response SLA Settings
2525
Response SLA settings are now applied to all reports and not just reports created after modification to SLA settings.

docs/changelog/2019/august.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: "August 2019"
3+
path: "/changelog/2019/august"
4+
date: "2019-08"
5+
---
6+
7+
### Program Hover State Profile
8+
9+
You can now better preview programs when hovering over program names with our revamped hover state profile popup. You can quickly view important information regarding the program when hovering over the program name on these pages:
10+
11+
* Hacktivity
12+
* Directory
13+
* My Programs
14+
* Pending Invitations
15+
* Bookmarked Programs
16+
* Hacker Dashboard
17+
18+
![program hover state popup](./images/aug_2019_program_hover_state.png)

docs/hackers/calendar.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ To add your HackerOne calendar to your personal calendar:
1919
3. Click **Copy** to copy the URL.
2020
4. Import your HackerOne calendar URL to your personal calendar in [iCal](#iCal) or [Google Calendar](#Google).
2121

22-
You can choose to regenerate your calendar URL by clicking **Regenerate**. Keep in mind that if you regenerate your URL, your calendar on the old URL won't be updated with new events. Only the current URL will be actively synced with new events.
22+
You can choose to regenerate your calendar URL by clicking **Regenerate**. Keep in mind that if you regenerate your URL, your calendar on the old URL won't be updated with new events. Only the current URL will be actively synced with new events.
2323

24-
<h3 id="iCal">Importing to iCal</h3>
24+
### Importing to iCal
2525

2626
1. Go to **File > New Calendar Subscription** in Calendar.
2727

@@ -35,7 +35,7 @@ You can choose to regenerate your calendar URL by clicking **Regenerate**. Keep
3535
4. Choose how frequently you want to refresh the events in the **Auto Refresh** field.
3636
5. Click **OK**.
3737

38-
<h3 id="Google">Importing to Google Calendar</h3>
38+
### Importing to Google Calendar
3939

4040
1. Open [Google Calendar](https://calendar.google.com/).
4141
2. Add a new calendar by selecting **From URL**.

docs/hackers/configure-the-hackerone-vpn.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ To configure the HackerOne VPN:
1414
2. Download your VPN Credentials from HackerOne (See: <i>Accessing your VPN Credentials</i> below)
1515
3. [Configure your OpenVPN Client](/hackers/openvpn-clients.html).
1616

17-
<h3 id="accessing">Accessing your VPN Credentials</h3>
17+
### Accessing your VPN Credentials
1818

1919
Once you've configured the HackerOne VPN and accepted an invitation to a VPN enabled program, to access your VPN Credentials:
2020

docs/hackers/directory.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,7 @@ The Directory is a community-curated resource that helps hackers identify the be
1717

1818
![revamped directory page](./images/better-directory-5.png)
1919

20-
<div class="background contents" markdown="1">
21-
22-
In this article you can learn about:|
23-
----------------------------------- |
24-
[Directory services](#services)|
25-
[What's on the Directory](#what's)|
26-
[Directory filters](#filters)|
27-
</div>
28-
29-
<h3 id="services">Directory Services</h3>
20+
### Directory Services
3021
The Directory provides relevant information for both hackers and programs.
3122

3223
The Directory enables Hackers to:
@@ -43,7 +34,7 @@ The Directory enables programs to:
4334
* Publish contact information for receiving information about potential vulnerabilities in their products or online services, such as a security@ email address or a HackerOne program (See [ISO 29147](http://www.iso.org/iso/catalogue_detail.htm?csnumber=45170) for additional guidance or [contact HackerOne](mailto:[email protected]))
4435
* [Search](https://hackerone.com/directory) for their organization to ensure that their security team's contact information and disclosure policy is accurate (See [Claiming the Security Page](/programs/security-page.html) if the program page hasn’t been claimed for editing)
4536

46-
<h3 id="what's">What's on the Directory</h3>
37+
### What's on the Directory
4738
You can find this information associated with an organization on the directory:
4839

4940
Option | Detail
@@ -57,7 +48,7 @@ Star Icon<br>![star icon](./images/better-directory-4.png) | Bookmark your favor
5748
Managed Icon<br>![managed icon](./images/better-directory-2.png) | Programs managed by HackerOne. These programs are more likely to respond quickly to your report and there's a higher likelihood of being successful on these programs because it's managed by the HackerOne triage team.
5849
Not Accepting Submissions Icon<br>![not accepting submissions icon](./images/better-directory-3.png) | A program that isn’t accepting any report submissions on HackerOne.
5950

60-
<h3 id="filters">Directory Filters</h3>
51+
### Directory Filters
6152
You can filter your list of programs by both program features and by asset type.
6253

6354
The program features you can filter include:

docs/hackers/disclosure.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -24,16 +24,7 @@ Disclosure by Default | You or the security team can request disclosure for any
2424
Disclosure requiring Mutual Agreement | You can request disclosure for any closed report in the program. If the program security team agrees to disclosure, the contents of the report will be made public. If the security team doesn't take any action, the contents of the report will remain private. <br><br>*The program must request to opt-in to this option.*
2525
Disclosure Disabled | Disclosure isn't allowed for any report.
2626

27-
<div class="background contents" markdown="1">
28-
29-
In this article, you can learn about: |
30-
------------------------------------- |
31-
[Requesting Disclosure](#requesting) |
32-
[Canceling Disclosure Requests](#canceling) |
33-
[Disclosure for Private Programs](#disclosure) |
34-
</div>
35-
36-
<h3 id="requesting">Requesting Disclosure</h3>
27+
### Requesting Disclosure
3728

3829
Both you and program members can request for disclosure. To request for disclosure:
3930
1. Go to the report you want to disclose.
@@ -58,7 +49,7 @@ After public disclosure has been requested, the admin of the of the program can
5849

5950
When publishing reports, the security team can choose to disclose the report in full or limit the information published. The default is to display all the communication between the hacker and the security team from first report to resolution.
6051

61-
<h3 id="canceling">Canceling Disclosure Requests</h3>
52+
### Canceling Disclosure Requests
6253

6354
You can cancel your disclosure request if you later decide to not disclose your report. You can also cancel disclosure requests from a program asking you for disclosure.
6455

@@ -71,7 +62,7 @@ To cancel a disclosure request:
7162
3. Enter a comment explaining why you are canceling the disclosure request.
7263
4. Click **Post**.
7364

74-
<h3 id="disclosure">Disclosure for Private Programs</h3>
65+
### Disclosure for Private Programs
7566

7667
Private programs can also enable you to disclose a report to other hackers within the program. Upon disclosure, contents of the report will only be visible to other hackers in the private program. This enables you and other hackers to share your vulnerability findings with other hackers in the program so that they can be aware of what vulnerabilities have been found for that program.
7768

docs/hackers/hacker-dashboard.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,7 @@ id: "hackers/hacker-dashboard"
1515

1616
The Hacker Dashboard enables you to view and manage all of your invitations.
1717

18-
<div class="background contents" markdown="1">
19-
20-
There are 4 tabs that you can view on the dashboard:|
21-
--------------------------------------------------- |
22-
[Overview](#overview) |
23-
[My Programs](#programs) |
24-
[Pending Invitations](#pending) |
25-
[Bookmarked Programs](#bookmarked) |
26-
</div>
27-
28-
<h3 id="overview">Overview</h3>
18+
### Overview
2919

3020
The Overview page is your guide to help you get started on HackerOne. You'll be directed to the right pages to help you get the information you need to successfully start out on HackerOne.
3121

@@ -37,7 +27,7 @@ After you've submitted your first vulnerability, you'll be able to keep track of
3727

3828
![hacker dashboard statistics](./images/hacker-stats-v2.png)
3929

40-
<h3 id="programs">My Programs</h3>
30+
### My Programs
4131

4232
![hacker dashboard my programs](./images/hacker-dashboard-my-programs.png)
4333

@@ -51,7 +41,7 @@ For each program, you can view:
5141

5242
You can elect to leave the private programs that you no longer have interest to participate in by clicking **Leave Program** next to the program you want to leave.
5343

54-
<h3 id="pending">Pending Invitations</h3>
44+
### Pending Invitations
5545

5646
![hacker dashboard pending invitations](./images/hacker-dashboard-2.png)
5747

@@ -70,7 +60,7 @@ Average Bounty | The average bounty that will be given for a valid vulnerability
7060

7161
Click <b>View Invitation</b> to review the invitation and take action to accept or reject it.
7262

73-
<h3 id="bookmarked">Bookmarked Programs</h3>
63+
### Bookmarked Programs
7464

7565
The Bookmarked Programs tab enables you to view the list of programs that you've marked as your favorites in the directory. This enables you to better keep track of the programs you're most interested in.
7666

docs/hackers/hackerone-vpn-root-ca.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Refer to these installation and configuration instructions for your platform:
1515

1616
><i>Note: Firefox manages its own trusted certificate list, so you always need to add the root authority certificate to the browser even if you've installed it system wide.</i>
1717
18-
<h3 id="windows">Windows</h3>
18+
### Windows
1919

2020
To install the HackerOne VPN Root CA to your Windows machine:
2121

@@ -48,7 +48,7 @@ To install the HackerOne VPN Root CA to your Windows machine:
4848

4949
![Screenshot](./images/vpn-windows-7.png)
5050

51-
<h3 id="macos">macOS</h3>
51+
### macOS
5252

5353
To install the HackerOne VPN Root CA to your macOS platform:
5454

@@ -73,7 +73,7 @@ To install the HackerOne VPN Root CA to your macOS platform:
7373

7474
![Screenshot](./images/vpn-macos-5.png)
7575

76-
<h3 id="ubuntu">Ubuntu/Debian Linux</h3>
76+
### Ubuntu/Debian Linux
7777

7878
Execute the following commands in your terminal to download and install the HackerOne VPN Root CA:
7979

@@ -83,7 +83,7 @@ Execute the following commands in your terminal to download and install the Hack
8383

8484
The command will state that it has installed one (or more) new certificates, through which the certificate has been successfully added to the Operating System.
8585

86-
<h3 id="firefox">Firefox</h3>
86+
### Firefox
8787

8888
To install the HackerOne VPN Root CA to Firefox:
8989

310 KB
Loading
27.8 KB
Loading
56.6 KB
Loading
246 KB
Loading
53.1 KB
Loading
279 KB
Loading
88.5 KB
Loading
399 KB
Loading
53.7 KB
Loading
228 KB
Loading
104 KB
Loading

docs/hackers/openvpn-clients.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Refer to these installation and configuration instructions for your platform:
1111
* [Windows](#windows)
1212
* [macOS](#macos)
1313

14-
<h3 id="windows">Windows</h3>
14+
### Windows
1515

1616
To configure the OpenVPN client to your windows machine:
1717

@@ -50,7 +50,7 @@ To configure the OpenVPN client to your windows machine:
5050

5151
The VPN will start connecting.
5252

53-
<h3 id="macos">macOS</h3>
53+
### macOS
5454

5555
To configure the OpenVPN client on macOS:
5656

docs/hackers/payments.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,7 @@ id: "hackers/payments"
1313
}
1414
</style>
1515

16-
<div class="background contents" markdown="1">
17-
18-
You can receive payments on HackerOne for finding and reporting valid vulnerabilities in the form of: |
19-
----------------------------------------------------------------------------------------------------- |
20-
[Bounties](#bounties) |
21-
[Swag](#swag) |
22-
[Bonuses](#bonuses) |
23-
</div>
24-
25-
<h3 id="bounties">Bounties</h3>
16+
### Bounties
2617

2718
A bounty is money you get rewarded with for reported and resolved bugs. They're used to attract the best hackers and to keep them incentivized to hack their programs. Bounties are used to encourage you to focus on particular assets by altering the reward amount for different vulnerability types. You won't get rewarded for every report you send in, but only for useful, valid reports.
2819

@@ -65,12 +56,12 @@ Generally, if the charity accepts donations in USD through PayPal or Credit Card
6556

6657
Keep in mind that you still need to have a valid tax form on file in order to donate your bounty. At this time, we can only donate bounties in full as we can't do partial or split donations.
6758

68-
<h3 id="swag">Swag</h3>
59+
### Swag
6960

7061
Your program can elect to award you with various swag in addition to or instead of bounties. Swag includes merchandise as well as free coupons or vouchers for the services or products the program offers. Some programs also offer to host hackers near their office or cover admissions fees to conferences you're invited to attend.
7162

7263
The program is responsible for fulfillment and delivery of swag to you.
7364

74-
<h3 id="bonuses">Bonuses</h3>
65+
### Bonuses
7566

7667
Programs can award bonuses to recognize hackers for positive actions beyond finding valid vulnerabilities. Bonuses enable programs to offer more flexible incentives without increasing the market rate for bounties.

docs/hackers/security-checks.md

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: "Security Checks"
3+
path: "/hackers/security-checks.html"
4+
id: "hackers/security-checks"
5+
---
6+
7+
Checklists are a way for organizations to meet compliance requirements by enlisting hackers to check for specific vulnerabilities on the OWASP top 10 list. Organizations that opt-in to using checklists will receive a compliance report that they can submit to certify their status among independent and industry compliance frameworks.
8+
9+
> **Note:** This feature is in beta and only accessible to select hackers.
10+
11+
### How it works
12+
To participate in a security check:
13+
14+
1. Go to a program’s **Security Checks** tab on their security page. The security checks tab is only available if the program has opted into compliance.
15+
16+
![security-check-image 1](./images/security-checks-1.png)
17+
18+
2. Click **View Details** for the task that you’re interested in on the checklist.
19+
3. Review the description, instruction, and scope for the task.
20+
4. Select **Claim this check** if you’re interested in completing the task.
21+
* You can claim 1 check per program at a time. After you've submitted your results, you can claim another check for that same program. Once you’ve claimed a check, you’ll have 72 hours to complete it. For each security check, you must test all assets in scope for the relevant vulnerability type.
22+
23+
![security check image 2](./images/security-checks-2.png)
24+
25+
5. Select **Submit results** on the Security Checks page of the program when you’re ready to submit your findings.
26+
27+
![security check iamge 3](./images/security-checks-3.png)
28+
29+
6. Input your findings in the required fields on the submission form.
30+
31+
![security check image 4](./images/security-checks-4.png)
32+
33+
7. *(Optional)* Submit a report and link it to your results if you find vulnerabilities during your check.
34+
35+
![security check image 5](./images/security-checks-5.png)
36+
37+
8. Click **Submit**.
38+
39+
Once you’ve submitted your results, HackerOne will review your findings. If your findings aren’t approved, your check will be marked as *Rejected*. If your check is rejected, you can reclaim the security check under **Hacker Dashboard > Security Checks**.
40+
41+
![security check image 6](./images/security-checks-6.png)
42+
43+
If your check is approved, you’ll automatically be paid the reward amount.
44+
45+
![security check image 7](./images/security-checks-7.png)
46+
47+
### Managing Security Checks
48+
49+
You can manage your claimed security checks on the Security Checks tab under your Hacker Dashboard.
50+
51+
![security check image 8](./images/security-checks-8.png)
52+
53+
You can also keep track of your Security Check rewards on your Hacker Dashboard.
54+
55+
![security check image 9](./images/security-checks-9.png)
56+
57+
### Releasing a Security Check
58+
If you decide that you no longer want to complete a security check, you can release the check by clicking **Release check** at the bottom of the security check submission page. Keep in mind that once you release the check, other hackers will be able to claim the check and any work you’ve done won’t be saved.
59+
60+
![security check image 10](./images/security-checks-10.png)
61+
62+
![security check image 11](./images/security-checks-11.png)

0 commit comments

Comments
 (0)