BugBase Documentation
  • 👋Welcome to BugBase Docs
  • Overview
    • 💡What we do
    • ⚡Changelogs
    • ✨Our Features
    • 📂Programs at BugBase
      • Vulnerability Disclosure Program (VDP)
      • Bug Bounty Program
      • Private Bounty Program
      • Pentest Program (VAPT)
  • Report Lifecycle
    • Bug Report
    • Report Status
  • How To
    • 👨‍💻Invite Organization Members to BugBase (RBAC)
    • 🚩Setup a Campaign for better program engagement
    • 🐛Submit a Bug Report on BugBase
    • 📑Create a Bug Bounty Program on BugBase
    • ⬇️Download the mobile app
  • Company Guide
    • 👨‍💼Create a Company Account
    • 🧭Navigation
    • 🛡️Assets Dashboard
    • 🗝️Credential Vaults
      • Creating a Credential Vault
      • Adding Credentials to Vault
      • Connect Credential Vault to an Asset
      • Require Whitelisting for a Credential
    • 🔐VPN Servers
      • Create, Configure and Deploy VPN server
      • Monitor Live Statistics and Logs
    • 🗂️Programs Dashboard
      • ⛳Create a Program
    • 📢Customer Support
    • 💵Bounty Bin
    • ⚙️Company Settings
      • 👨‍🏫Profile
      • 🏢Organisation
      • 👨‍🏭Roles and Permissions
      • 🔐Security & Authentication
        • Multi-Factor Authentication
        • SSO with SAML
          • Okta SSO setup via SAML
          • Google SSO setup via SAML
      • 🎨Customization
        • Automations
        • Report Tags
      • 📙Manage Access
    • 📈Insights Dashboard
    • 🔊Campaigns
    • 💲Understanding Currencies Used in BugBase
    • 🤝Whitelist
  • Program guide
    • Bug Bounty Dashboard
      • Program Reports Section
        • Report Components
        • Report Actions
        • Duplicating Reports
        • Assigning Swags
        • Assigning Bounties
        • Assigning Thanks to Reporters
        • Assigning Bonus Bounty
        • Automatic Response Generator using ChatGPT
      • Program Policy
        • Editing Program Policy
          • Best Practices For Designing Policy
          • Best Practices For Bounty Tables
      • Payouts
      • Settings
    • Private Bug Bounty Dashboard
      • Invite Hackers
      • Manage Credentials
    • VDP Dashboard
    • Pentest Dashboard
      • Pentest Overview
      • Vulnerabilities Section
        • Pentest Report Components
        • Pentest Report Actions
      • Global Pentest Chat
    • Competition Dashboard
      • Dashboard
      • Creating a Competition
        • Adding Challenges
      • Manage Competitions
        • Statistics
        • Leaderboard
        • Manage Users
  • Bounty Hunter Guide
    • Bounty Hunter Dashboard
    • Bounty Hunter Profile
    • Programs Directory
      • Program Policy Page
      • Credentials
      • VPN Access
      • Whitelist
      • Collaborate
    • Bounty Hunter Reports Section
      • Submitting Reports
      • Interaction with Program Representees
      • Collaboration
      • Response Generation through ChatGPT on Report Chat
    • Competitions
    • Discord Community
    • Leaderboard
    • Multi-Factor Authentication
    • Settings
      • Verify KYC
    • Email Alias
    • 🚀Apollo Community
  • Integrations
    • 🔗Supported Integrations
    • Webhooks
    • JIRA
      • Creating a JIRA Issue
    • Slack
      • Managing Integration
    • Microsoft Teams
    • Github
    • Asana
    • Sumo Logic
    • PagerDuty
  • on-premise
    • Running Automated Testing
    • Sandbox Environment
Powered by GitBook
On this page
  • What are Campaigns?
  • Why would I want to create a Campaign?
  • Creating a Campaign
  • Edit a Campaign

Was this helpful?

  1. Company Guide

Campaigns

Start a Campaign for better outreach to bounty hunters!

PreviousInsights DashboardNextUnderstanding Currencies Used in BugBase

Last updated 1 year ago

Was this helpful?

What are Campaigns?

Campaigns are special promotional events during which participants receive increased rewards for submitting valid reports.

Why would I want to create a Campaign?

Creating a campaign on a bug bounty platform offers several advantages to clients, particularly in terms of enhancing security and engaging the community:

  1. Focused Attention on Critical Areas: A campaign can direct the attention of skilled researchers towards specific areas of your system or product. This is especially useful if you've recently updated your software, are preparing for a major launch, or need extra scrutiny on certain components.

  2. Increased Participation: Higher bounties typically attract more participants, including top-tier researchers. This increased participation means more eyes examining your systems, which can lead to the discovery of vulnerabilities that might otherwise go unnoticed.

  3. Faster Discovery of Vulnerabilities: With more researchers incentivized to participate, vulnerabilities are likely to be discovered and reported more quickly. This rapid identification allows you to address issues sooner, reducing the window of risk.

  4. Enhanced Security Posture: By addressing vulnerabilities found during a campaign, you strengthen your overall security posture. This can enhance your reputation for taking security seriously, which is valuable for customer trust and business credibility.

  5. Community Engagement and Reputation Building: Engaging with the bug bounty community through campaigns can help build a positive reputation among security researchers. This goodwill can lead to more thorough and dedicated testing in both current and future campaigns.

  6. Cost-Effectiveness: While you pay more per vulnerability, you benefit from the concentrated effort within a specific timeframe. This focused approach can be more cost-effective compared to continuous, lower-intensity testing.

  7. Strategic Security Investments: Campaigns allow you to allocate budget strategically during critical periods, ensuring that your investment in security aligns with business needs and cycles.

  8. Competitive Edge: Demonstrating a proactive approach to security can give you a competitive edge, showing customers and partners that you prioritize protecting their data and privacy.

In summary, launching a campaign on a bug bounty platform is an effective way to quickly identify and address vulnerabilities, engage with the security community, and reinforce your commitment to security, all of which are crucial for maintaining the trust and safety of your clients and their users.

Creating a Campaign

The create campaign section provides the user to create a new campaign according to your preferences with custom bounties and custom duration.

Edit a Campaign

This page gives the user to modify the created campaign and customise it further.

Once the campaign details are filled up users can see the preview of the campaign they just created.

🔊
Campaigns page