an image demonstrating screenshots from our Bounty product
HackerOne Bounty

Bug bounty programs for businesses

Tap into the skills of the global hacker community to uncover high-risk vulnerabilities faster.

It takes a hacker to know a hacker

Bug bounty programs allow hackers to help you find application defects that elude conventional security tools and teams.

model_training
Trained to see what others miss

Gain a fresh perspective so you don’t miss flaws that malicious actors can exploit.

bug_report
Continuous testing, constant protection

Keep watchful eyes on your applications, cloud assets, APIs, and supply chain at all times.

assignment_turned_in
Access expert skills

Access technical skills your team lacks to be sure security doesn’t slow down the pace of innovation.

Want to know how a bounty program can reduce risk?

Tell us about your security testing initiatives and one of our experts will contact you.

Request a live demo

What is Bug Bounty?

A bug bounty is a monetary reward given to ethical hackers for successfully discovering and reporting a vulnerability or bug to the application's developer. Bug bounty programs allow companies to leverage the ethical hacking and security researcher community to improve their systems’ security posture over time continuously. Bug bounties can complement existing security controls by exposing vulnerabilities that automated scanners miss, and incentivize security researchers to emulate what a potential bad actor would attempt to exploit.

an image demonstrating screenshots from our Bounty product
Advanced workflows

Workflows that adapt to your development life cycle

The Hackerone Bug Bounty Platform streamlines workflow orchestration across teams to speed response, reduce risk, and scale your bounty program. 

  • Integrate and automate bug testing with the security and development tools you use today.
  • Fix vulnerabilities faster with remediation guidance and retesting capabilities.
  • Create automations that trigger actions based on the criticality of vulnerabilities or service level agreements.
an image demonstrating screenshots from our Bounty project
Vulnerability Risk Rating

Size up potential threats and take action

Our centralized bug bounty platform dashboard shows you which vulnerabilities pose the greatest risk to your organization.

  • Monitor the health of your bounty program in real time with insights across the vulnerability life cycle. 
  • See how your high-severity issues stack up against your industry's norms.
  • Access data that classifies and assigns vulnerabilities using Common Vulnerability Scoring System (CVSS) and Common Weakness Enumeration (CWE). 
     
an image of our hacker profiles along with their skills listed
Skills Mapping

Skills you need, talent you can trust

Our bug bounty redefines the traditional static, signature-based model of security testing by providing an adversarial perspective on the enterprise IT environment. 

  • Access experts in cloud, mobile, hardware, IoT and more.
  • Select ID-verified and background-checked ethical hackers to cover sensitive internal assets.
  • Provide secure, monitored access to sensitive assets using our VPN gateway.  
an image of one of our hacker team members standing at a laptop working
Report Triage

Triage you can count on

HackerOne triage staff communicates with hackers,validates their submissions, removes duplicates, and ranks the remaining vulnerabilities by severity. 

  • Receive only valid vulnerabilities, eliminate false positives, and streamline remediation.
  • Our team manages hacker communications and provides you with actionable reports.
  • Fast, accurate, and responsive — just a few words our customers use to describe our triage service.

Meet our Hackers

1

The platform that declares open season on bugs

We make it a snap to integrate hacker insights into your security operations.

account_tree
Advanced workflows

Use custom workflow triggers and intelligent pattern matching.

video_call
Video reporting

See a recorded report to verify issues and remediations.

api
API and webhooks

Automate  event calls and report creation.

autorenew
Hacker retesting

Verify vulnerability fixes using hackers.

monetization_on
Hacker payment processing

Issue tax forms, do OFAC checks, and send payouts in 50+ currencies.

notification_add
Slack and Microsoft Teams notifications

Reduce context switching, increase transparency, and speed up work.

file_copy
Duplicate detection

Learnings from other accounts reduce duplicates in yours.

groups
Hacker collaboration

Let hackers form teams to collaborate on hunting vulnerabilities.

Learn more about Bug Bounty
HackerOne
Financial Services: Tips for Bug Bounty Success