Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit f610c14

Browse files
authored
Update good-policies.md
1 parent c036e41 commit f610c14

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/programs/good-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ Bounty Program | Define the vulnerability types you care about most and provide
1313
Exclusions | Create exclusions for the vulnerabilities hackers should ignore.
1414
Scope | List the URLs in scope for your program.
1515

16-
Some successful security pages you can refer to as examples are: [Twitter](https://hackerone.com/twitter), [Dropbox](https://hackerone.com/dropbox), [Square](https://hackerone.com/square), [Yahoo](https://hackerone.com/yahoo).
16+
Some successful security pages you can refer to as examples are: [Twitter](https://hackerone.com/twitter), [Dropbox](https://hackerone.com/dropbox), [Yahoo](https://hackerone.com/yahoo).
1717

1818
Other best practices to keep in mind are:
19-
* **Keep your policy succinct.** Longer policies may lose leadership toward the end.
19+
* **Keep your policy succinct.** Longer policies may lose readership toward the end.
2020
* **Set clear expectations with hackers.** If your response time or fix time is much longer than recommended, state it in your policy. It's good practice to respond to researchers within 3-5 days and to have complete fixes within 45 days.
2121
* **Give responses updating a hacker that you're still reviewing a report.** Such actions let hackers know that their work hasn't gone into a black hole.
2222
* **Re-evaluate your policy on a recurring basis.** Your policy will and should change as your bug bounty program matures.

0 commit comments

Comments
 (0)