You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/programs/bounty-tables.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ To set up and publish your bounty table on your security page:
12
12
2. <i>(Optional)</i> Edit the column names of the bounty table that best fit the reward structure of your program under the **Bounty Table** section.
13
13
3. Input your bounty amounts under each column.
14
14
* Note: Critical vulnerabilities should have the highest bounty amount whereas a severity rating of Low should have the lowest amount.
15
-
4. <i>(Optional)</i> Add a description about how severity is determined or examples of what types of bugs fall into which category.
15
+
4. <i>(Optional)</i> Add a description about how severity is determined or examples of what types of bugs fall into which category in the **Optional description** field.
0 commit comments