For Organizations that Require Strict Finder Vetting and Enhanced Program Controls
Learn MoreVerified Clear finders have high signal and impact reputation scores.
Uncover vulnerabilities that pose real threats to your business.
Meet compliance and legal requirements with custom, digital agreements.
Identify HackerOne finder traffic and pause/restart a Clear program or individual finder.
Use Clear for sensitive applications and open testing of other apps to the broader HackerOne community.
Test internal assets not exposed to the public internet with HackerOne Gateway and IP whitelisting.
Clear’s Advanced Finder Vetting feature is designed for organizations that require strict finder verification capabilities consisting of ID verification, criminal background checks, and skill validation based on the finder’s historical performance.
For all countries, we perform Identification Document verification and the maximum Criminal Background Check allowed by law.
For example, Clear vetting for U.S.-based finders includes:For finders located outside of the United States, we include the Office of Foreign Assets Control (OFAC) check and a comprehensive criminal inspection.
From private financial records to sensitive patient health data to top secret military systems, many security testing use cases require strict transparency and auditability not available in standard crowdsourced programs.
Gateway allows for all program traffic to be routed through HackerOne’s proprietary VPN technology, capturing all finder traffic data and providing the transparency and controls needed by highly-regulated customers, such as government agencies, insurers, banks, and healthcare organizations.
Quickly set-up Gateway to isolate finder traffic, speed incident response, quiet false-alarms, and more.
Bring the security testing effectiveness of vetted finders to pre-production and internal assets.
Access detailed activity logs specifying assets tested on a per finder basis.
The Clear Bundle is available as a premium add-on for any managed Challenge or Bounty program
Work with top-performing and background-checked finders in our community.
Audit and control your crowdsourced testing of sensitive and internal assets through our proprietary VPN.