Frequently Asked Questions
Bug Bounty programs raise money for security researchers from around the world to participate, discover and report vulnerabilities and bugs in a company’s systems before malicious users discover and exploit them.
The idea behind a bug bounty program is very clever, as companies actually use hackers to deal with other hackers. Essentially, a bug bounty is a monetary reward given to so-called “ethical hackers” in order to use their knowledge and skills to protect an organization from malicious hackers. It is quite reminiscent of traditional security checks with the difference that ethical hackers from all over the world are involved and not restrictively by one company.
Initially, many researchers may find the same vulnerability. Only the first researcher who submits a valid report is rewarded. In general, the main criterion for the remuneration’s amount is the severity of the vulnerability, as defined by the customer. The more serious the vulnerability mentioned, the higher the reward. Payment is managed by a third-party payment platform that meets European compliance requirements. Scores are also awarded, depending on the quality of the researcher’s report.
A researcher is a person who searches for, identifies and reports vulnerabilities through a Bug Bounty program. In this way, it helps to enhance overall cyber security.
The operational risks are similar to those of an intrusion test. In addition, Bug Bounty scopes are generally exposed on the Internet, so they may be subject to external attacks. Finally, a researcher could use his involvement in the bug bounty for other malicious purposes, although this is extremely rare.
A bug bounty is a monetary reward given to so-called “ethical hackers” in order to use their knowledge and skills to protect an organization from malicious hackers.
A Bug Bounty platform allows an organization to promote a Bug Bounty program to researchers / hackers, who are registered on the platform. Researchers can then search for and report security vulnerabilities found in this program.
A private program is submitted only to specific researchers, selected by the client. On the other hand, a public program is submitted to the entire research community that is registered on the bug bounty platform.
Bug Awards helps you select the researchers that best suit your needs (knowledge and skills required for what you want to test, your program budget, etc.).
When you start a program, it is better to start with a limited scope. Gradually, you can expand the scope, making the rules more flexible and / or increasing the number of researchers.
The total cost of a Bug Bounty program is usually based on three criteria:
- The scope you have defined,
- the number of researchers looking for their vulnerabilities and their profile (knowledge, skills); and
- the rewards that researchers usually gain.
Get Started with Bug Awards.
*To contact you or get in touch with us.