Get More Program Invitations
Complete all the sections of your profile to get invitations from different programs.
Welcome Aboard.!! Thus begins your journey with Safehats, a comprehensive Bug-bounty platform by Instasafe. This is an exciting opportunity for you to be rewarded for your skills, by alerting companies to the vulnerabilities in their product and services,before they can be exploited. Gain a firsthand white-hat experience and learn from expertise of fellow researchers, and in time establish yourself as a reliable security researcher, while earning cash and goodies. This documentation will guide you in getting familiarized with the platform enable you to start working soon, as well as be your guide in case you face some problem. Happy Hunting...!!
Get Started on SafeHatsJust register on our website, complete your profile and you are good to go. Follow these simple steps:-
This is the first page u land after logging in. It contains information about status bug bounty reports submitted by you, and about received by you. This is to keep you updated about activities.
Information on program the reasearcher is a part of,and all associated data is a part of is displayed here
The contains general information about the user. It is also the public facing part of the user account. This contains metric to judge the hacker’s overall performance. This section also enables the user to add and edit personal and payment related information.
Complete all the sections of your profile to get invitations from different programs.
Upload your ID as soon as you create a profile.Profile without a valid Id proof will not be considerd eligible for participation into any program.
The detail status of all submitted reports can be veiwed from here.
This displays the top ranking hackers along with metrics of performance
Now that you are familiar with the interface it’s time to get started on customizing and managing your account.
Updating your profile is easy. Just click on the edit icon on the top left section of your profile. You will be directed to edit profile page. Here u can enter required information and update your profile.
Safehats offers three different kind of program depending upon security maturity of the enterprise
All security researchers registered on the platform are eligible to participate in public/Fly Programs. Participation into Run programs is by invite only.The hackers are selected on a variety of factors depending upon their skill,expertise,karma score depending upon discretion of the program owner.
This clearly defines the guidelines that must be followed during the course of the program and is created with the intention of resolving any ambiguity that might arise during the course of the program.This is to help guide your efforts into finding what vulnerability needs attention and what not. This scope of the program i.e which product, what properties and what types of vulnerability are to be discovered and more specifically what all are excluded is clearly mentioned in the program policy. This also contains how the vulnerabilities discovered, should be communicated to the program owner.
The standards mentioned in the policy should strictly be followed while disclosing a bug.The details guidelines that are to be adhered while reporting a bug are mentioned in the next section Under no circumstances should information about a bug be made public,until prior approval from the organiser is obtained.
Reports can be submitted by clicking on the “Submit-Report” section of the program’s home page which will direct to the Submission.
A submitted report consists of the following sections:-
This clearly defines the guidelines that must be followed during the course of the program and is created with the intention of resolving any ambiguity that might arise during the course of the program.This is to help guide your efforts into finding what vulnerability needs attention and what not. This scope of the program i.e which product, what properties and what types of vulnerability are to be discovered and more specifically what all are excluded is clearly mentioned in the program policy. This also contains how the vulnerabilities discovered, should be communicated to the program owner.
The contents of this documentation should fimiliarise you with workings of platform. The FAQ's section answers most general question on bug bounty program.In case of any additional queries please feel free to mail us at support@safehats.com.