You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/programs/run-a-good-program.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ Programs that engage in [disclosure](disclosure.html) find themselves having hig
16
16
It’s best practice to actively [communicate with your hackers](communicating-with-hackers.html) by commenting on reports and answering any questions or concerns they have in a timely manner and letting them know of any updates or changes to your program by using the [message hackers](programs/message-hackers.html) feature.
17
17
18
18
### Tip #4: Utilize Bounty Tables
19
-
Set up [bounty tables](programs/bounty-tables.html) as they help hackers to see how much is rewarded based on the severity level of the vulnerability. Additionally, it’s important that you set your bounties to fair amounts that don’t underpay hackers.
19
+
Set up [bounty tables](bounty-tables.html) as they help hackers to see how much is rewarded based on the severity level of the vulnerability. Additionally, it’s important that you set your bounties to fair amounts that don’t underpay hackers.
20
20
21
21
### Tip #5: Keep your policy up-to-date
22
22
Make sure all helpful and important information is written on your [policy](policy-and-scope.html) and that you follow the [best practices for good policies](programs/good-policies.html).
0 commit comments