Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit d644f49

Browse files
committed
Fix links to blog
1 parent 8f2bd91 commit d644f49

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

contributing-guidelines.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,13 +45,13 @@ date: "2016-11"
4545
---
4646
```
4747

48-
### Github Formatting
48+
### GitHub Formatting
4949
How do I... | Answer
5050
----------- | -------
5151
Add a link to a page within the docs site of the same book | `[Start H1 Response](start-h1-response.html)` or `[Start H1 Bounty](start-h1-bounty.html)`.
5252
Add a link to a page within the docs site to an article in another book | `[Start H1 Bounty](/programs/start-h1-bounty.html)`
5353
Add an image | `![image name](./images/signal-impact-2.png)`
54-
Reference the HackerOne blog link | Use `https://hackerone.com/blog` not www.hackerone.com/blog
54+
Reference the HackerOne blog link | Use `https://www.hackerone.com/blog` not www.hackerone.com/blog
5555

5656
### Active Voice
5757
We use active voice at HackerOne as active voice is more personal and engaging vs. passive voice. In active voice, the subject does or acts upon the verb, while in passive voice, the subject is being acted upon.

docs/changelog/2015/december.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: "2015-12"
55
---
66

77
### Signal & Impact
8-
We introduce Signal and Impact so that there can be a more granular understanding of hacker performance. Read our [blog post](https://hackerone.com/blog/introducing-signal-and-impact) or check out our [doc](https://docs.hackerone.com/hackers/signal-and-impact.html) to learn more.
8+
We introduce Signal and Impact so that there can be a more granular understanding of hacker performance. Read our [blog post](https://www.hackerone.com/blog/introducing-signal-and-impact) or check out our [doc](https://docs.hackerone.com/hackers/signal-and-impact.html) to learn more.
99
![dec_2015_signal_impact](./images/dec_2015_signal_impact.png)
1010

1111
### New Default Views

docs/changelog/2015/november.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ date: "2015-11"
55
---
66

77
### HackerOne Success Index
8-
We introduce the HackerOne Success Index - a method to measure the effectiveness of HackerOne-powered vulnerability disclosure programs. The index calculates 6 dimensions by which programs can benchmark their success each month. Learn more [here](https://hackerone.com/blog/success-in-vulnerability-disclosure).
8+
We introduce the HackerOne Success Index - a method to measure the effectiveness of HackerOne-powered vulnerability disclosure programs. The index calculates 6 dimensions by which programs can benchmark their success each month. Learn more [here](https://www.hackerone.com/blog/success-in-vulnerability-disclosure).
99
![nov_2015_success_index](./images/nov_2015_success_index.png)
1010

1111
### Disclosure Assistance
12-
We provide hackers with the ability to request help in contacting an organization with a vulnerability through Disclosure Assistance. This enables HackerOne to take steps to identify the organization’s official vulnerability reporting process. Read more in our [blog](https://hackerone.com/blog/vulnerability-disclosure-assistance).
12+
We provide hackers with the ability to request help in contacting an organization with a vulnerability through Disclosure Assistance. This enables HackerOne to take steps to identify the organization’s official vulnerability reporting process. Read more in our [blog](https://www.hackerone.com/blog/vulnerability-disclosure-assistance).
1313
![nov_2015_disclosure_assistance](./images/nov_2015_disclosure_assistance.jpg)
1414

1515
### Trigger: Show Interstitial

docs/changelog/2015/september.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: "2015-09"
55
---
66

77
### Vulnerability Coordination Maturity Model
8-
We introduce the Vulnerability Coordination Maturity Model which helps programs increase their dependence on internet-connected software. Learn more about this model in our [blog post](https://hackerone.com/blog/vulnerability-coordination-maturity-model
8+
We introduce the Vulnerability Coordination Maturity Model which helps programs increase their dependence on internet-connected software. Learn more about this model in our [blog post](https://www.hackerone.com/blog/vulnerability-coordination-maturity-model
99
).
1010
![sep_2015_maturity_model](./images/sep_2015_maturity_model.png)
1111

docs/changelog/2019/january.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Jira users can also now select from multiple projects they want their Jira task
2525
![selecting projects](./images/jan_2019_jira_projects.png)
2626

2727
### Indian Rupee Payments
28-
Hackers in India will no longer lose a portion of their bounty to transfer fees as we now support payments to [Indian Rupees](https://hackerone.com/blog/Introducing-Indian-Rupee-payments-Cheaper-and-faster-bank-transfers).
28+
Hackers in India will no longer lose a portion of their bounty to transfer fees as we now support payments to [Indian Rupees](https://www.hackerone.com/blog/Introducing-Indian-Rupee-payments-Cheaper-and-faster-bank-transfers).
2929

3030
![adding Indian Rupee](./images/jan_2019_indian_rupee.png)
3131

0 commit comments

Comments
 (0)