Read the Security Page closely, which will give you the information you need to participate in the program, including the scope of the program and reward expectations.
Be sure to take a look at our Disclosure Guidelines which outline the basic expectations that both security teams and hackers agree to when joining HackerOne.įind a participating program. You can remain anonymous with a pseudonym, but if you are awarded a bounty you will need to provide your identity to HackerOne. You will need a name, username, and a valid email address.