|
| 1 | +--- |
| 2 | +title: "May 2023" |
| 3 | +path: "/changelog/2023/may" |
| 4 | +date: "2023-05" |
| 5 | +--- |
| 6 | + |
| 7 | +### Campaigns |
| 8 | +All Enterprise and Professional bounty customers now have Campaigns available to use. Reach out to learn how to enable it for your program. |
| 9 | + |
| 10 | +### Lead Pentester |
| 11 | +Lead pentesters can now apply as a lead or team member, allowing pentesters more flexibility to pick up pentest opportunities. Lead pentesters can use this when they wish to apply to an assessment but do not wish to perform the additional lead responsibilities. |
| 12 | + |
| 13 | +### Command Palette |
| 14 | +The Command Palette is now available to all hackers. It provides a natural language input to let the user navigate the platform. It can also be used to quickly look up useful information such as CWE description, resume a report draft, or toggle platform themes. |
| 15 | + |
| 16 | +### Opportunities Search - Relevance Sort |
| 17 | +Opportunities search now has a results-sorting option for **Relevance**. |
| 18 | + |
| 19 | +### Explore |
| 20 | +All customers have access to the beta of the new Explore functionality. This allows them to understand what data makes up dashboard charts for a better understanding of their metrics. |
| 21 | +To use: |
| 22 | +* Go to Analytics > Dashboards or Engagements > [Select a Bounty program] > Dashboard. |
| 23 | +* Find a bar chart of interest, select the dropdown menu from the kabob menu (three vertical dots) |
| 24 | +* Select "Explore." |
| 25 | +*Note: this feature is currently only available on bar charts.* |
| 26 | + |
| 27 | +### Exporting Reports |
| 28 | +We’ve improved the Report Export feature with UX improvements to simplify the exporting functionality. Check out the before and after below. |
| 29 | + |
| 30 | + |
| 31 | +### User Management 2.0 |
| 32 | +We are excited to announce the launch of User Management 2.0. The launch introduces two key areas of change - the Users and Groups in the organization settings. |
| 33 | +From the Users page you can now invite Users to the organization and grant access to programs through groups, view groups the user has access to, and view inbox, program, and assets access each group has. |
| 34 | +From the Groups page, you can now grant access to multiple programs via a single group. Each group lists the organization, program, inbox, and asset inventory. Additionally, from the same page, you can edit the groups and filter by groups, programs, and permissions with the support of advanced filters. |
| 35 | +Finally, if you are the organization administrator, you can delete all groups, except the HackerOne Triage group of course. |
| 36 | +These changes simplify the views and reduce the level of effort for our customers in management of access controls within the HackerOne platform. |
| 37 | +For more information, please visit the [User Management](/docs/organizations/user-management.html) page on our doc site. |
| 38 | + |
| 39 | +### Trend Data |
| 40 | +Trend analysis data is now publicly available for all weaknesses (CWEs). CWE IDs in markdown will now automatically open @Hacker0x01 trend data and allow you to discover related vulnerabilities on the platform. |
| 41 | + |
| 42 | +### Encode and Decode |
| 43 | +Encode and decode text straight from HackerOne! Users often need to encode or decode payloads from reports in order to reproduce or retest them. Use this feature by selecting text and clicking *Editor*. |
| 44 | + |
| 45 | +### Performance Dashboard |
| 46 | +Hackers can now access advanced data exploration, enabling deeper insights into data through their Performance Dashboard. Now hackers can know exactly which data makes up a chart or number. |
| 47 | + |
| 48 | +### Hacktivity Discovery |
| 49 | +Better Hacktivity discovery! Publicly disclosed reports now have a section that lets anyone discover similar security vulnerabilities based on CWE through Hacktivity. |
0 commit comments