Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 2779d5c

Browse files
committed
updates to hacktivity artile - added in publishing external vulns
1 parent cf12021 commit 2779d5c

File tree

2 files changed

+5
-1
lines changed

2 files changed

+5
-1
lines changed

docs/hackers/hacktivity.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,10 @@ Hacktivity only showcases activity for public programs. Hacker activity populate
2525

2626
><i>Note: Undisclosed reports appear with a redacted title.</i>
2727
28+
You and other hackers can also publish your findings from external sources outside of HackerOne. To learn more, see: [Publishing External Vulnerabilities](/hackers/publishing-external-vulnerabilities.html).
29+
2830
### Search
29-
You can search for reports regarding programs and weaknesses you're interested to read about in the search bar to better learn how specific weaknesses were exploited in various programs.
31+
You can search for reports regarding programs and weaknesses you're interested to read about in the search bar to better learn how specific weaknesses were exploited in various programs.
3032

3133
### Upvoting
3234
You can upvote hacker activities that you find interesting by clicking on the arrow next to the activity. Your upvotes help members of the platform discover what the most popular hacker activities are. Anyone with an account can upvote, but you can only upvote once on each activity. When you hover over the upvote count, you can see the top 10 hackers (ranked by Signal) that voted on the activity.

docs/programs/hacktivity.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ Hacktivity only showcases activity for public programs. Hacker activity populate
2525

2626
><i>Note: Undisclosed reports appear with a redacted title.</i>
2727
28+
Hackers can also publish their findings from external sources outside of HackerOne. To learn more, see: [Publishing External Vulnerabilities](/hackers/publishing-external-vulnerabilities.html).
29+
2830
### Search
2931
You can search for reports regarding programs and weaknesses you're interested to read about in the search bar to better learn how specific weaknesses were exploited in various programs.
3032

0 commit comments

Comments
 (0)