Fully Vetted Access

HackerOne Clear can be added to any HackerOne private program, bolstering your existing security efforts. Clear connects you with talented, ID-verified, and background-checked security researchers from our million-strong community, providing 24x7x365 coverage for your most sensitive internal assets.

Gateway brings crowdsourced security to your internal attack surfaces through IP whitelisting. It allows for program traffic to be routed through HackerOne’s proprietary VPN, capturing researcher traffic data and providing transparency on all testing activities.

Proven Success

Researchers vetted by Clear hail from over 60 countries and have identified more than 43,000 valid vulnerabilities, including over 8,600 critical and high-severity vulnerabilities. Specialized Clear researchers also have varying levels of US federal government clearances.

Gateway provides full visibility into your testing activities, giving you confidence in your coverage and transparency for your stakeholders.

HackerOne Clear Proven Success
Clear Thorough Background Checks

Thorough Background Checks for Complete Confidence

Clear gives even the most risk-averse organizations the confidence to bring third-party security researchers into their security programs. Clear screens researchers using background checks, digital click-through agreements, reputation scores, and Code of Conduct reviews, plus includes real-world skills validation to ensure researchers have the expertise to uncover high-impact vulnerabilities. Vetting even includes confirming clearance for Top Secret/Sensitive Compartmented Information (TS/SCI).

Secure VPN for Enhanced Visibility and Control

Gateway routes all security program traffic through HackerOne’s proprietary VPN, providing the additional traceability required in highly regulated industries. It even enables external security researchers to test internal or pre-production assets, with IP whitelisting and granular controls down to the individual researcher. Plus, Gateway features split tunnel, researcher-level segregation, and logging with SSL decryption.

Read More

Transparency and Control

Confident Assurance
  • Know your researchers. Partner with ID-verified and background-checked security researchers so you know they have the right skills and experience.
  • Ensure compliance. Comply with regulations, standards, and audit-based requirements.
Enhanced Visibility
  • Secure access. Provide access to assets behind the firewall by whitelisting HackerOne IPs.
  • Secure any scope. Enable secure testing across the most sensitive internal or external attack surfaces.
HackerOne Clear Security Research

Access the World’s Elite Security Researchers

Only the most elite security researchers are chosen to participate in HackerOne Clear programs. These experts have a pristine track record of following program policies, adhering to HackerOne’s Code of Conduct. Past reports must be comprehensive, clear, and complete. If a HackerOne program explicitly requires testing via the Gateway VPN, security researchers will adhere to that restriction, as well.

Rigorous Vetting for Quality and Security

The best security researchers want to work with organizations who demand more. But those researchers also expect more: transparency, a speedy resolution of reported issues, and public recognition. They look for a rich bounty table structure, an engaging and competitive scope, and a direct relationship with your program management team to continuously improve the program.

HackerOne Clear Rigorous Vetting

In Their Words