BugBase Documentation
  • 👋Welcome to BugBase Docs
  • Overview
    • 💡What we do
    • ⚡Changelogs
    • ✨Our Features
    • 📂Programs at BugBase
      • Vulnerability Disclosure Program (VDP)
      • Bug Bounty Program
      • Private Bounty Program
      • Pentest Program (VAPT)
  • Report Lifecycle
    • Bug Report
    • Report Status
  • How To
    • 👨‍💻Invite Organization Members to BugBase (RBAC)
    • 🚩Setup a Campaign for better program engagement
    • 🐛Submit a Bug Report on BugBase
    • 📑Create a Bug Bounty Program on BugBase
    • ⬇️Download the mobile app
  • Company Guide
    • 👨‍💼Create a Company Account
    • 🧭Navigation
    • 🛡️Assets Dashboard
    • 🗝️Credential Vaults
      • Creating a Credential Vault
      • Adding Credentials to Vault
      • Connect Credential Vault to an Asset
      • Require Whitelisting for a Credential
    • 🔐VPN Servers
      • Create, Configure and Deploy VPN server
      • Monitor Live Statistics and Logs
    • 🗂️Programs Dashboard
      • ⛳Create a Program
    • 📢Customer Support
    • 💵Bounty Bin
    • ⚙️Company Settings
      • 👨‍🏫Profile
      • 🏢Organisation
      • 👨‍🏭Roles and Permissions
      • 🔐Security & Authentication
        • Multi-Factor Authentication
        • SSO with SAML
          • Okta SSO setup via SAML
          • Google SSO setup via SAML
      • 🎨Customization
        • Automations
        • Report Tags
      • 📙Manage Access
    • 📈Insights Dashboard
    • 🔊Campaigns
    • 💲Understanding Currencies Used in BugBase
    • 🤝Whitelist
  • Program guide
    • Bug Bounty Dashboard
      • Program Reports Section
        • Report Components
        • Report Actions
        • Duplicating Reports
        • Assigning Swags
        • Assigning Bounties
        • Assigning Thanks to Reporters
        • Assigning Bonus Bounty
        • Automatic Response Generator using ChatGPT
      • Program Policy
        • Editing Program Policy
          • Best Practices For Designing Policy
          • Best Practices For Bounty Tables
      • Payouts
      • Settings
    • Private Bug Bounty Dashboard
      • Invite Hackers
      • Manage Credentials
    • VDP Dashboard
    • Pentest Dashboard
      • Pentest Overview
      • Vulnerabilities Section
        • Pentest Report Components
        • Pentest Report Actions
      • Global Pentest Chat
    • Competition Dashboard
      • Dashboard
      • Creating a Competition
        • Adding Challenges
      • Manage Competitions
        • Statistics
        • Leaderboard
        • Manage Users
  • Bounty Hunter Guide
    • Bounty Hunter Dashboard
    • Bounty Hunter Profile
    • Programs Directory
      • Program Policy Page
      • Credentials
      • VPN Access
      • Whitelist
      • Collaborate
    • Bounty Hunter Reports Section
      • Submitting Reports
      • Interaction with Program Representees
      • Collaboration
      • Response Generation through ChatGPT on Report Chat
    • Competitions
    • Discord Community
    • Leaderboard
    • Multi-Factor Authentication
    • Settings
      • Verify KYC
    • Email Alias
    • 🚀Apollo Community
  • Integrations
    • 🔗Supported Integrations
    • Webhooks
    • JIRA
      • Creating a JIRA Issue
    • Slack
      • Managing Integration
    • Microsoft Teams
    • Github
    • Asana
    • Sumo Logic
    • PagerDuty
  • on-premise
    • Running Automated Testing
    • Sandbox Environment
Powered by GitBook
On this page
  • Marking the Status of the Report
  • Requesting a Retest
  • Connecting to Various Integrations
  • Adding comments
  • Printing Vulnerability Report

Was this helpful?

  1. Program guide
  2. Pentest Dashboard
  3. Vulnerabilities Section

Pentest Report Actions

In the pentest report action section, program managers have the ability to manage reports in an efficient manner by taking various actions on them. These actions include:

  • Marking the status of a report as ignored or resolved

  • Requesting a retest for a vulnerability

  • Connecting the report to various integrations

  • Adding comments and notes to the report

  • Printing a specific vulnerability report

Marking the Status of the Report

This allows program managers to update the status of a vulnerability report to indicate that it has been addressed or is not a valid issue.

To change the status of a report

  1. Go to the metadata panel and click on the "Mark Vulnerability Status" button.

  2. This will bring up a dropdown menu where you can select the desired status for the report, such as "Ignored" or "Resolved."

Requesting a Retest

If a program manager is unsure about the validity of a report, they can request a retest to have the vulnerability re-evaluated.

To request a retest of a vulnerability

  1. Go to the metadata panel and click on the "Request Retest" button.

Connecting to Various Integrations

Program managers can connect their pentest reports to various integrations such as Jira, Asana and Github. This allows program managers to integrate their pentest program with their existing workflows and processes.

To connect to various integrations,

  1. Go to the metadata panel and click on the "Connect to * " button.

Adding comments

Program managers can add comments to a report in order to provide feedback or additional information to the pentester who submitted the report.

Printing Vulnerability Report

Program managers can print a report in order to have a physical copy for record keeping or for sharing with other team members.

To print a vulnerability report

  1. Go to the metadata panel and click on the "Print Report" button.

  2. This will open a printable version of the report that you can print or save as a PDF.

PreviousPentest Report ComponentsNextGlobal Pentest Chat

Last updated 1 year ago

Was this helpful?