Skip to main content

Reporting bugs

Writing a good report

Get straight to our point in a way that the security or triage team can comprehend. Bug reports should include information on how exploitation of each vulnerability can be reproduced step-by-step.

tip

When reporting to less mature companies, we may have to translate technical security issues into more understandable/business terms for them to understand the actual impact of each vulnerability.

Essential elements

The essential elements of a good bug report are:

Vulnerability TitleIncluding vulnerability type, affected domain/parameter/endpoint, impact etc.
CWE & CVSS scoreFor communicating the characteristics and severity of the vulnerability.
Vulnerability DescriptionBetter understanding of the vulnerability cause.
Proof of Concept (POC)Steps to reproduce exploiting the identified vulnerability clearly and concisely.
ImpactElaborate more on what an attacker can achieve by fully exploiting the vulnerability. Business impact and maximum damage should be included in the impact statement.
RemediationOptional in bug bounty programs, but good to have.

Why CWE & CVSS?

Please refer to [../cwe_and_cvss/README.md] for more information.

Good report examples

Here are some good report examples selected by HackerOne:

note

Refer to the Submitting Reports section of HackerOne's docs portal for the actual process a bug bounty hunter has to follow to submit a bug report.