Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit c18527c

Browse files
authored
updated with links to products in hackerone.com
1 parent 1d7da1d commit c18527c

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docs/programs/overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,21 +12,21 @@ HackerOne offers 3 different products that you can choose from:
1212
* HackerOne Bounty
1313

1414
### HackerOne Response
15-
Establish an ISO 29147 compliant disclosure policy to safely receive and act on vulnerabilities discovered by external third-parties. This welcomes a "See Something, Say Something" process that helps ensure that security reports end up with your security team instead of unreliable channels like social media.
15+
Establish an ISO 29147 compliant disclosure policy to safely receive and act on vulnerabilities discovered by external third-parties. This welcomes a "See Something, Say Something" process that helps ensure that security reports end up with your security team instead of unreliable channels like social media. [Try Response](https://www.hackerone.com/product/response).
1616

1717
![overview-2](./images/overview-2.png)
1818

1919
### HackerOne Challenge
20-
A private, project-based, and time-bound vulnerability assessment program. Challenges are perfect for organizations looking to supplement or replace traditional penetration tests with ethical hackers looking for severe vulnerabilities. Every Challenge includes a detailed report to help meet compliance requirements.
20+
A private, project-based, and time-bound vulnerability assessment program. Challenges are perfect for organizations looking to supplement or replace traditional penetration tests with ethical hackers looking for severe vulnerabilities. Every Challenge includes a detailed report to help meet compliance requirements. [Try a Challenge](https://www.hackerone.com/product/challenge).
2121

2222
![overview-1](./images/overview-1.png)
2323

2424
### HackerOne Bounty
25-
A program where trusted hackers are incentivized to continuously test for critical vulnerabilities. Bounty programs can be private and invite-only or fully public, and all incentives will reflect the organization’s priorities.
25+
A program where trusted hackers are incentivized to continuously test for critical vulnerabilities. Bounty programs can be private and invite-only or fully public, and all incentives will reflect the organization’s priorities. [Try Bounty](https://www.hackerone.com/product/bounty).
2626

2727
![overview-3](./images/overview-3.png)
2828

2929
### Next Steps
3030
If you've decided to:
31-
* Start a HackerOne Bounty or Response program, see: Program Start-Up Guide.
31+
* Start a HackerOne Bounty or Response program, see: [Program Start-Up Guide](program-start-up-guide.html).
3232
* Start a HackerOne Challenge program, send a note to [email protected].

0 commit comments

Comments
 (0)