Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit a4e0bf7

Browse files
committed
included how to unlock a report
1 parent 1d44f96 commit a4e0bf7

File tree

3 files changed

+46
-13
lines changed

3 files changed

+46
-13
lines changed

contributing-guidelines.md

Lines changed: 45 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,6 @@
1-
# Style Guide
2-
### Changelog
3-
When adding a new entry to the changelog, make sure you format the file such that the first several lines of the markdown file are:
1+
# Style Guide
42

5-
`---`<br>
6-
`title: "November 2016"`<br>
7-
`path: "/changelog/2016/november"`<br>
8-
`date: "2016-11"`<br>
9-
`---`
10-
11-
### New Articles
3+
### Adding New Articles
124
You can add new articles to either the Hacker Book or the Program Book.
135

146
#### Hacker Book
@@ -29,10 +21,51 @@ When adding a new article to the program book, make sure you format the file suc
2921
`id: "programs/title-of-the-article"`<br>
3022
`---`
3123

32-
### Formatting
24+
#### Changelog Entry For a New Month
25+
You can also add a changelog entry for a new month that isn't listed on the changelog yet. To add a changelog entry for a new month, make sure you format the file such that the firs several lines of the markdown file are:
26+
27+
`---`<br>
28+
`title: "Month Year"`<br>
29+
`path: "/changelog/[year]/[month]"`<br>
30+
`date: "year-month number"`<br>
31+
`---`
32+
33+
Example:
34+
<br>`---`<br>
35+
`title: "November 2016"`<br>
36+
`path: "/changelog/2016/November"`<br>
37+
`date: "2016-11"`<br>
38+
`---`
39+
40+
### Github Formatting
3341
How do I... | Answer
3442
----------- | -------
3543
Add a link to a page within the docs site of the same book | `[Start H1 Response](start-h1-response.html)` or `[Start H1 Bounty](start-h1-bounty.html)`.
3644
Add a link to a page within the docs site to an article in another book | `[Start H1 Bounty](/programs/start-h1-bounty.html)`
3745
Add an image | `![image name](./images/signal-impact-2.png)`
38-
Referencing the HackerOne blog link | Use `https://hackerone.com/blog` not www.hackerone.com/bog
46+
Referencing the HackerOne blog link | Use `https://hackerone.com/blog` not www.hackerone.com/blog
47+
48+
### Active Voice
49+
We use active voice at HackerOne as active voice is more personal and engaging vs. passive voice. In active voice, the subject does or acts upon the verb, while in passive voice, the subject is being acted upon.
50+
51+
Active Voice (Yes, please use this!) | Passive Voice (Steer away from this)
52+
------------------------------------ | -------------------------------------
53+
Click the link to search | The link should be clicked when you're ready to search for an article.
54+
The hacker reported the vulnerability. | The vulnerability was reported by the hacker.
55+
The security team triaged the report. | The report was triaged by the security team.
56+
57+
### Contractions
58+
In order to convey a personal and less formal voice, it's best to use contractions instead of the formal non-contractions.
59+
60+
Contraction - (Yes, please use this!) | Non-Contracted Phrases (Steer away from this)
61+
------------------------------------- | -----------------------------------
62+
can't | cannot
63+
don't | do no
64+
won't | will not
65+
it's | it is
66+
they're | they are
67+
we've | we have
68+
you're | you are
69+
70+
### Spelling
71+
There are some words that can be used either way. In order to keep consistency, we need to agree on which ambiguous word we'll be using.
40.6 KB
Loading

docs/programs/response-target-metrics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ HackerOne tracks and enables you to define targets for these 4 response efficien
88

99
Response Efficiency Metric | Details
1010
---- | -------
11-
Time to first response | The elapsed time from when the report is submitted to the first public activity on a report. The first public activity includes adding a public comment, changing the report state, or changing the report severity.
11+
Time to first response | The elapsed time from when the report is submitted, to the first public activity on a report. The first public activity includes adding a public comment, changing the report state, or changing the report severity.
1212
Time to triage | The elapsed time from when a report is submitted to when a report is changed to a triaged state. A report can skip the triaged state and move directly to a closed state (e.g. resolved).
1313
Time to bounty | *(Bounty programs only)* The elapsed time from when a report is triaged to when a bounty is paid. Only reports that are eligible for a bounty will be tracked as part of this metric. The time to bounty timer will run until the report is either marked as ineligible or closed as a state where it’s not normal to award a bounty (e.g. spam).<br><br><i>Awarding swag in lieu of a bounty won't stop the timer. If you only award a report with swag, you must mark the report as ineligible for bounty to stop the timer</i>.
1414
Time to resolution | The elapsed time from when a report is submitted to when a report is closed. These five closed report states will stop the timer: <i>resolved, informative, not applicable, duplicate,</i> and <i>spam</i>. For programs using [human-augmented signal](human-augmented-signal.html), the resolution timer starts when the report has been approved by HackerOne Security Analysts and escalated to the customer's inbox.

0 commit comments

Comments
 (0)