FAQs
What’s a Bug Bountry Program?

Bug Bounty Programs are offered by enterprises by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities. These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse.

What’s SafeHats?

SafeHats is the Bug Bounty Program run by Instasafe using which your enterprise can leverage the brainpower of security researchers to pentest your apps.

How do I join for SafeHats program?

You can sign up at SafeHats website after which 1. Create your Bug Bounty Program 2. Launch the program 3. Get filtered reports from Safehats.

Which types of apps can I put for Bug Bounty Program?

Any category of web and mobile apps

Will starting a Bug Bountry Program make our apps more vulnerable?

Applications are attacked without invitation too. Indeed you are incentivizing researchers to discover bugs soon, there by limiting the chances of a security threat.

What’s the difference between a Private program and a Public program?

Private program is where the invitations are sent only to the SafeHats curated list of security researchers. Public program is where the invitations will be sent to all the security researchers registered with Safehats.

How do I know the security researchers won't compromise our site?

All the security researchers have to agree to the standard disclosure policy in order to be part of a Bug Bountry Program. Additionally they also have to agree to each company specific disclosure policy and terms of conditions. You can also specify the eligibility,scope of the program and the rewards the researchers will be receiving in exchange for the vulnerabilities identified which keeps them motivated to work with you.

What’s an ideal time frame for a Bug Bounty Program?

It’s best to run your programs now with a time frame of 1 month to 3 months. We will be launching on going programs in a while.

How secure is my data?

Data is encrypted before being stored in our system. Only your team members with access privilege will be able see your data.

Where is my data stored?

Safehats utilizes certified data centers managed by Amazon.

What’s the disclosure policy?

The disclosure policy by each company specifies the guidelines that you have to follow and abide by if you’re participating in the program. The vulnerabilities that you identifying will be sensitive and organizations expect responsible handling of those vulnerabilities and not disclosing it in public. The policy takes care of these.

How do I report the bugs?

You have to report the bugs as per the format and disclosure policy specified the each organization

When do I get the rewards?

The vulnerabilities reported by you will be verified and acknowledged by the security team of the organization. Once they fix the vulnerability you will be compensated with the appropriate rewards

I’m not an independent researcher, but a company which offers vulnerability assessment services. Can I be part of this program?

SafeHats Bug Bounty Program is open to individuals as of now. Keep checking this space to check the updates.

How do I apply for Bug Bounty Program from an organization?

You can submit your profile by signing up for SafeHats program. We’ll reach out to verify your profile. Once you are successfully onboard, you will start to receive invitations for Bug Bounty Program which matches your profile.