Com Olho Knowledge Base
  • ๐Ÿ‘‹Welcome to Com Olho Knowledge Base
  • Overview
    • ๐Ÿ’กWhat we do
    • โœจOur Features
  • Researcher Guide
    • ๐Ÿ“ชSigning Up
    • ๐Ÿ‘ฉโ€๐ŸซCreating User Profile
    • ๐Ÿ“ฝ๏ธSelecting Programs
    • ๐Ÿ“ŽMaking Submissions
    • ๐Ÿ’ฐInvoices and Receipts for Your Rewards
  • Organisation Guide
  • โ›๏ธSigning Up
  • ๐ŸŽฃListing Bug Bounty Program
  • โฎ๏ธReviewing Submissions
  • ๐Ÿ–‹๏ธAwarding Bounty
  • ๐Ÿ‘ฉโ€๐Ÿ’ปAlias Management
  • ๐Ÿ‘จโ€๐Ÿ’ปStakeholder Management
  • Fundamentals
    • ๐Ÿ› ๏ธGetting set up
      • ๐Ÿ“Participating in CTF
      • ๐Ÿง‘Watching Coding Workshops
  • Use Cases
    • ๐Ÿ”ŽFor Researchers
    • โ„น๏ธFor Organisations
  • Integrations
    • Jira Integration
    • Zoho Desk Integration
Powered by GitBook

COM OLHO IT PRIVATE LIMITED

On this page

Awarding Bounty

PreviousReviewing SubmissionsNextAlias Management

Last updated 11 months ago

Description:

  • Introduction: After successfully reviewing and validating a submission, the next step is to award the bounty to the researcher. This step is crucial to incentivize and acknowledge their efforts.

  • Purpose: Awarding bounties encourages continuous collaboration and helps in building a robust security posture.

Content:

  • Steps to Award Bounty:

    1. Determine Bounty Amount:

      • Assess the severity and impact of the reported vulnerability.

      • Refer to your organizationโ€™s bounty SLA to determine the reward.

    2. Approval Process:

      • Submit the bounty amount for internal approval (if required).

      • Ensure all necessary documentation is complete.

FAQs:

  • How is the bounty amount determined?

    • The amount is based on the severity and impact of the reported vulnerability, as per our bounty guidelines.

Contact Support:

  • If you encounter any issues, please reach out to our support team at support@comolho.com.


๐Ÿ–‹๏ธ