You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/hackers/directory.md
+34-31Lines changed: 34 additions & 31 deletions
Original file line number
Diff line number
Diff line change
@@ -4,49 +4,52 @@ path: "/hackers/directory.html"
4
4
id: "hackers/directory"
5
5
---
6
6
7
-
The Directory is a community-curated resource for contacting security teams. It identifies the best way to contact an organization's security team so that all hackers can report potential vulnerabilities directly to the organizations that can resolve them. The directory is comprised of a list of various organizations that both use and don't use HackerOne. It documents the existence of an organization's vulnerability disclosure policy and any associated bug bounty programs.
7
+
The Directory is a community-curated resource that helps hackers identify the best way to contact an organization's security team. This guides hackers with reporting potential vulnerabilities directly to the organizations that can resolve them. The Directory is comprised of a list of various organizations that both use and don't use HackerOne. It documents the existence of an organization's vulnerability disclosure policy and any associated bug bounty programs.
8
8
9
-
As HackerOne believes that all organizations who build technology should provide a safe process for vulnerability disclosure, the HackerOne Directory aids in providing a safer internet as it provides hackers with the ability to contact an organization with their found vulnerabilities.
9
+

10
10
11
-

11
+
In this article you can learn about:
12
+
* Directory services
13
+
* What's on the Directory
14
+
* Directory filters
15
+
* Correcting Information on the Directory
12
16
13
17
### Directory Services
18
+
The Directory provides relevant information for both hackers and programs.
19
+
14
20
The Directory enables Hackers to:
15
-
* Share their disclosure experiences and add security team contact information to the Directory so others can benefit from their work.
16
-
*[Search the Directory](https://hackerone.com/directory) to get the contact information for an organization's security team.
17
-
* Find programs they're interested to hack on.
21
+
*[Search](https://hackerone.com/directory) for an organization to get the contact information of a security team.
22
+
* Add security team contact information for an organization so that other hackers know where to submit vulnerabilities (See [Create a Directory Page](/hackers/create-a-directory-page.html))
23
+
* As the directory is community-curated, hackers who maintain sufficient reputation have edit rights and can update information about an organization. If you don’t have edit rights, you can reach a moderator at [email protected] with any changes.
24
+
* Find programs they're interested to hack on
25
+
* View and compare statistics of various programs
18
26
19
-
*Note: If an organization hasn't published security contact information anywhere, HackerOne recommends considering assistance from the [local CERT](https://www.first.org/members/teams/).*
27
+
><i>Note: If an organization hasn't published security contact information anywhere, HackerOne recommends considering assistance from the [local CERT](https://www.first.org/members/teams/).</i>
20
28
21
29
The Directory enables programs to:
22
-
* Publish contact information for receiving information about potential vulnerabilities in their products or online services, such as a security@ email address or a HackerOne program. See [ISO 29147](http://www.iso.org/iso/catalogue_detail.htm?csnumber=45170) for additional guidance or [contact HackerOne](mailto:[email protected]).
23
-
*[Search the Directory](https://hackerone.com/directory) for their organization to ensure that their security team's contact information and disclosure policy is accurate.
30
+
* Publish contact information for receiving information about potential vulnerabilities in their products or online services, such as a security@ email address or a HackerOne program (See [ISO 29147](http://www.iso.org/iso/catalogue_detail.htm?csnumber=45170) for additional guidance or [contact HackerOne](mailto:[email protected]))
31
+
*[Search](https://hackerone.com/directory) for their organization to ensure that their security team's contact information and disclosure policy is accurate (See [Claiming the Security Page](/programs/security-page.html) if the program page hasn’t been claimed for editing)
24
32
25
33
### What's on the Directory
26
34
You can find this information associated with an organization on the directory:
27
35
28
36
Option | Detail
29
37
------ | ------
38
+
Launch Date | The date the program started to accept vulnerabilities.
30
39
Bugs Resolved | The total number of vulnerabilities the organization has resolved. If the field is marked with a `-` this means that there are no resolved reports, or the program chose not to display this information on their metric display settings.
31
-
Minimum Bounty | The minimum bounty that will be given for a valid vulnerability. If the field is marked with a `-` this means that there is no minimum bounty, or the program chose not to display this information on their metric display settings.
32
-
33
-
As the directory contains various icons, refer to this table to understand the different icons associated with an organization:
34
-
35
-
Icon | Detail
36
-
---- | ------
37
-
IBB <br> | Indicates Internet Bug Bounty - a bug bounty program for core internet infrastructure and free open source software. These programs are managed by a panel of volunteers selected from the security community. Learn more [here](https://www.hackerone.com/internet-bug-bounty).
38
-
Managed <br></br> | A program that is managed by HackerOne. These programs are more likely to respond quickly to your report and there's a higher likelihood of being successful on these programs because it's managed by the HackerOne triage team.
39
-
Not accepting submissions <br>| A program that isn't accepting any report submissions on HackerOne.
40
-
Pink thunderbolt <br></br> | The program responds quickly to report submissions. There's a <48 hour first response time.
41
-
Purple and pink thunderbolt <br></br> | The program responds quickly to report submissions and is also quick in awarding bounties. There's a <48 hour first response time and a <14 day time in awarding a bounty.
42
-
43
-
### Using the Directory
44
-
You can search for organizations in the directory by searching for them in the search bar. You can also filter organizations by asset type and sort them by:
45
-
* Newest
46
-
* Oldest
47
-
* Bounty Amount
48
-
* Number of bugs resolved
49
-
* Alphabetized name
50
-
51
-
### Correcting Information on the Directory
52
-
As the directory is community-curated, hackers who maintain sufficient reputation have edit rights and can update information about an organization, or you can reach a moderator at [email protected] with any changes.
40
+
Response Efficiency | The percentage of reports that are responded to on time within the last 90 days.
41
+
Bounties Minimum | The minimum bounty that will be given for a valid vulnerability. If the field is marked with a `-` this means that there is no minimum bounty, or the program chose not to display this information on their metric display settings.
42
+
Bounties Maximum | The maximum bounty that’ll be given for a valid vulnerability. If the field is marked with a `-` this means that there is no minimum bounty, or the program chose not to display this information on their metric display settings.
43
+
Managed Icon | Programs managed by HackerOne. These programs are more likely to respond quickly to your report and there's a higher likelihood of being successful on these programs because it's managed by the HackerOne triage team.
44
+
Not Accepting Submissions Icon | A program that isn’t accepting any report submissions on HackerOne.
45
+
46
+
### Directory Filters
47
+
You can filter your list of programs by both program features and by asset type.
48
+
49
+
The program features you can filter include:
50
+
51
+
Option | Detail
52
+
------ | ------
53
+
IBB | Indicates Internet Bug Bounty - a bug bounty program for core internet infrastructure and free open source software. These programs are managed by a panel of volunteers selected from the security community. Learn more [here](https://www.hackerone.com/internet-bug-bounty).
54
+
Offers bounties | Programs that offer bounties as rewards for finding vulnerabilities.
55
+
Invite-only | Programs that only allow you to submit vulnerabilities through an invitation.
0 commit comments