{"version":1,"pages":[{"id":"dyUDCbroURAgJudS5MbW","title":"Welcome to BugBase Docs","pathname":"/","siteSpaceId":"sitesp_qrLvz","emoji":"1f44b","description":"If you want to know how things work at BugBase, these docs will help you to understand the product so that you can easily navigate through your hacker-powered security program."},{"id":"T53mcgbjVEESo7gfszFi","title":"What we do","pathname":"/overview/what-we-do","siteSpaceId":"sitesp_qrLvz","emoji":"1f4a1","description":"BugBase is a curated marketplace for ethical hackers that helps businesses and startups set up bug bounty and vulnerability disclosure programmes.","breadcrumbs":[{"label":"Overview"}]},{"id":"j9Ymo0mnn0VkW5eu6ex9","title":"Changelogs","pathname":"/overview/changelogs","siteSpaceId":"sitesp_qrLvz","emoji":"26a1","description":"BugBase pushes out features continuously, here's all the updates in the platforms at one place.","breadcrumbs":[{"label":"Overview"}]},{"id":"0OBx2tmYQDssQqVvsg2u","title":"Our Features","pathname":"/overview/our-features","siteSpaceId":"sitesp_qrLvz","emoji":"2728","description":"BugBase keeps businesses safe by providing an all-in-one platform to perform continuous and comprehensive security testing.","breadcrumbs":[{"label":"Overview"}]},{"id":"gt84QZChY5gJbxytLzR1","title":"Programs at BugBase","pathname":"/overview/programs-at-bugbase","siteSpaceId":"sitesp_qrLvz","emoji":"1f4c2","description":"BugBase helps you host various crowdsourced security operations in one comprehensive dashboard where you can track, identify and mitigate vulnerabilities with ease.","breadcrumbs":[{"label":"Overview"}]},{"id":"a12q8r5mk2zRoCGVqBEY","title":"Vulnerability Disclosure Program (VDP)","pathname":"/overview/programs-at-bugbase/vulnerability-disclosure-program-vdp","siteSpaceId":"sitesp_qrLvz","description":"Hosting a VDP is a great way to keep your application well protected and secured.","breadcrumbs":[{"label":"Overview"},{"label":"Programs at BugBase","emoji":"1f4c2"}]},{"id":"uu2PvynzRbkM82WLTLY2","title":"Bug Bounty Program","pathname":"/overview/programs-at-bugbase/bug-bounty-program","siteSpaceId":"sitesp_qrLvz","description":"An active crowdsourced security initiative. We filter bug reports so you do not waste time on distinguishing signal from noise","breadcrumbs":[{"label":"Overview"},{"label":"Programs at BugBase","emoji":"1f4c2"}]},{"id":"qWchP3hNtx8wUx76Bz1n","title":"Private Bounty Program","pathname":"/overview/programs-at-bugbase/private-bounty-program","siteSpaceId":"sitesp_qrLvz","description":"Private Bug Bounty program is an invite only bug bounty program where companies can choose to invite particular ethical hackers to test their application.","breadcrumbs":[{"label":"Overview"},{"label":"Programs at BugBase","emoji":"1f4c2"}]},{"id":"9U4oamEQ9k6aVclDYb96","title":"Pentest Program (VAPT)","pathname":"/overview/programs-at-bugbase/pentest-program-vapt","siteSpaceId":"sitesp_qrLvz","description":"Get an in-depth analysis of the security of your application and reduce any probability of a security breach.","breadcrumbs":[{"label":"Overview"},{"label":"Programs at BugBase","emoji":"1f4c2"}]},{"id":"8CZmXj3GN9bodZJFwFyf","title":"Bug Report","pathname":"/report-lifecycle/bug-report","siteSpaceId":"sitesp_qrLvz","description":"A Report that is submitted on BugBase has comprehensive information about a vulnerability. Below are a few pointers that may help you to understand on how to analyse a report on BugBase","breadcrumbs":[{"label":"Report Lifecycle"}]},{"id":"fqWEL4Vd2sJv3LlZJhd4","title":"Report Status","pathname":"/report-lifecycle/report-status","siteSpaceId":"sitesp_qrLvz","description":"Each Report on BugBase has a status associated with it to identify the stage of a particular vulnerability from submission to resolution","breadcrumbs":[{"label":"Report Lifecycle"}]},{"id":"9Lvo6HGTUym5BUvsNLUF","title":"Invite Organization Members to BugBase (RBAC)","pathname":"/how-to/invite-organization-members-to-bugbase-rbac","siteSpaceId":"sitesp_qrLvz","emoji":"1f468-1f4bb","description":"Learn how to set up Role-Based Access Control on your BugBase Dashboard and invite your team members.","breadcrumbs":[{"label":"How To"}]},{"id":"jn34WNYdpmaBMHcZRpTS","title":"Setup a Campaign for better program engagement","pathname":"/how-to/setup-a-campaign-for-better-program-engagement","siteSpaceId":"sitesp_qrLvz","emoji":"1f6a9","description":"Learn how to set up a Time-Based Campaign on your BugBase Bug Bounty Programs to improve engagement.","breadcrumbs":[{"label":"How To"}]},{"id":"hof0MlqSuuHm1cRey0Ln","title":"Submit a Bug Report on BugBase","pathname":"/how-to/submit-a-bug-report-on-bugbase","siteSpaceId":"sitesp_qrLvz","emoji":"1f41b","description":"Learn how to submit a bug report for a program listed on BugBase as a security researcher.","breadcrumbs":[{"label":"How To"}]},{"id":"JnGQpY7QWhvyntAeijMT","title":"Create a Bug Bounty Program on BugBase","pathname":"/how-to/create-a-bug-bounty-program-on-bugbase","siteSpaceId":"sitesp_qrLvz","emoji":"1f4d1","description":"Learn how to create and setup a Bug Bounty Program on BugBase","breadcrumbs":[{"label":"How To"}]},{"id":"fn5rTMKGmkAQsEEBXWgV","title":"Download the mobile app","pathname":"/how-to/download-the-mobile-app","siteSpaceId":"sitesp_qrLvz","emoji":"2b07","description":"Bugbase offers a mobile app that can be installed directly from your browser","breadcrumbs":[{"label":"How To"}]},{"id":"9E9NQhwIg1plgHh2NFf5","title":"Create a Company Account","pathname":"/company-guide/create-a-company-account","siteSpaceId":"sitesp_qrLvz","emoji":"1f468-1f4bc","description":"We at BugBase have made it really easy to create a company account. All you need to do it fill a 2 step form to register your account with BugBase","breadcrumbs":[{"label":"Company Guide"}]},{"id":"KvOsZK0D073OqfjoZzSU","title":"Navigation","pathname":"/company-guide/navigation","siteSpaceId":"sitesp_qrLvz","emoji":"1f9ed","description":"Here is an overview for navigation that can be found in the Bugbase platform","breadcrumbs":[{"label":"Company Guide"}]},{"id":"csMKsT2QZY0Rdi7O6X5z","title":"Assets Dashboard","pathname":"/company-guide/assets-dashboard","siteSpaceId":"sitesp_qrLvz","emoji":"1f6e1","description":"The Assets Dashboard in Bugbase allows program managers to easily manage and track their assets, with features like adding, editing, deleting, and labeling assets to improve understanding.","breadcrumbs":[{"label":"Company Guide"}]},{"id":"AXRTCtDlzCTFiiSNE8l2","title":"Credential Vaults","pathname":"/company-guide/credential-vaults","siteSpaceId":"sitesp_qrLvz","emoji":"1f5dd","description":"BugBase enables importing testing credentials for assets and assigning them to program members and Bug Hunters.","breadcrumbs":[{"label":"Company Guide"}]},{"id":"XAZ3bxjNoJZu9JsdnK2U","title":"Creating a Credential Vault","pathname":"/company-guide/credential-vaults/creating-a-credential-vault","siteSpaceId":"sitesp_qrLvz","description":"Learn how to create a Credential Vault","breadcrumbs":[{"label":"Company Guide"},{"label":"Credential Vaults","emoji":"1f5dd"}]},{"id":"YqYd5yLr6X8KKZ4S8Zp8","title":"Adding Credentials to Vault","pathname":"/company-guide/credential-vaults/adding-credentials-to-vault","siteSpaceId":"sitesp_qrLvz","description":"Learn how to add Credential Sets to a Credential Vault","breadcrumbs":[{"label":"Company Guide"},{"label":"Credential Vaults","emoji":"1f5dd"}]},{"id":"7pKBvxit5CEDBUbQ3fAE","title":"Connect Credential Vault to an Asset","pathname":"/company-guide/credential-vaults/connect-credential-vault-to-an-asset","siteSpaceId":"sitesp_qrLvz","description":"Learn how to connect a Credential Vault to a Company Asset","breadcrumbs":[{"label":"Company Guide"},{"label":"Credential Vaults","emoji":"1f5dd"}]},{"id":"xX5U0LEKl8njr52oDTvP","title":"Require Whitelisting for a Credential","pathname":"/company-guide/credential-vaults/require-whitelisting-for-a-credential","siteSpaceId":"sitesp_qrLvz","description":"Enable the \"Require Whitelisting\" feature on Dynamic Credential Vaults to ensure only authorized users can request or claim credentials","breadcrumbs":[{"label":"Company Guide"},{"label":"Credential Vaults","emoji":"1f5dd"}]},{"id":"xjUdu6AqVGcWli4QC28M","title":"Resolving Issues on Credentials","pathname":"/company-guide/credential-vaults/resolving-issues-on-credentials","siteSpaceId":"sitesp_qrLvz","description":"Security Researchers raise issues on credentials","breadcrumbs":[{"label":"Company Guide"},{"label":"Credential Vaults","emoji":"1f5dd"}]},{"id":"zoUMBcqzpAFqe3Bgzb8N","title":"VPN Servers","pathname":"/company-guide/vpn-servers","siteSpaceId":"sitesp_qrLvz","emoji":"1f510","description":"BugBase enables companies to create and manage VPN servers for secure testing of sensitive assets by Bug Hunters.","breadcrumbs":[{"label":"Company Guide"}]},{"id":"cJ2ySYTqBXAX99q7tWHR","title":"Create, Configure and Deploy VPN server","pathname":"/company-guide/vpn-servers/create-configure-and-deploy-vpn-server","siteSpaceId":"sitesp_qrLvz","description":"Learn how to configure and deploy a VPN server with all your assets on BugBase","breadcrumbs":[{"label":"Company Guide"},{"label":"VPN Servers","emoji":"1f510"}]},{"id":"JSaNE58RdurpE01OSqQ0","title":"Monitor Live Statistics and Logs","pathname":"/company-guide/vpn-servers/monitor-live-statistics-and-logs","siteSpaceId":"sitesp_qrLvz","description":"Monitor all the activities through the VPN server","breadcrumbs":[{"label":"Company Guide"},{"label":"VPN Servers","emoji":"1f510"}]},{"id":"F5Nh96UcXaqTHwdTFkuy","title":"Programs Dashboard","pathname":"/company-guide/programs-dashboard","siteSpaceId":"sitesp_qrLvz","emoji":"1f5c2","description":"An overview of all the programs hosted on BugBase","breadcrumbs":[{"label":"Company Guide"}]},{"id":"3UchUr1fprTJmkl37DPj","title":"Create a Program","pathname":"/company-guide/programs-dashboard/create-a-program","siteSpaceId":"sitesp_qrLvz","emoji":"26f3","description":"How to go about creating a program","breadcrumbs":[{"label":"Company Guide"},{"label":"Programs Dashboard","emoji":"1f5c2"}]},{"id":"b1tRuY0pSEa5DIFh3Zsr","title":"Customer Support","pathname":"/company-guide/customer-support","siteSpaceId":"sitesp_qrLvz","emoji":"1f4e2","description":"24/7 Support Channel for Issues and Doubt resolution","breadcrumbs":[{"label":"Company Guide"}]},{"id":"HVLiTTFuVOJunmeR6Jnk","title":"Bounty Bin","pathname":"/company-guide/bounty-bin","siteSpaceId":"sitesp_qrLvz","emoji":"1f4b5","description":"BugBase Bounty Bin helps you track and manage bounties paid to hackers across the globe!","breadcrumbs":[{"label":"Company Guide"}]},{"id":"UZ9q9OmqikUbDJYNfwsv","title":"Company Settings","pathname":"/company-guide/company-settings","siteSpaceId":"sitesp_qrLvz","emoji":"2699","description":"Manage your company account from here","breadcrumbs":[{"label":"Company Guide"}]},{"id":"P2ekdPaIOyV0ZhClMeIy","title":"Profile","pathname":"/company-guide/company-settings/profile","siteSpaceId":"sitesp_qrLvz","emoji":"1f468-1f3eb","description":"","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"}]},{"id":"PT5IuZe23vBMGj0RdUyS","title":"Organisation","pathname":"/company-guide/company-settings/organisation","siteSpaceId":"sitesp_qrLvz","emoji":"1f3e2","description":"Add members to your organisation and track all activities.","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"}]},{"id":"P2vBuX10GIKimkYf0ewg","title":"Roles and Permissions","pathname":"/company-guide/company-settings/roles-and-permissions","siteSpaceId":"sitesp_qrLvz","emoji":"1f468-1f3ed","description":"Create, View and Modify Roles and Permissions","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"}]},{"id":"BkVsvUzN73thp6fefajt","title":"Security & Authentication","pathname":"/company-guide/company-settings/security-and-authentication","siteSpaceId":"sitesp_qrLvz","emoji":"1f510","description":"We offer various Security & Authentication Methods for extra security.","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"}]},{"id":"diurO0oQDIcUhCZ4ygP7","title":"Multi-Factor Authentication","pathname":"/company-guide/company-settings/security-and-authentication/multi-factor-authentication","siteSpaceId":"sitesp_qrLvz","description":"Secure your account with Multi-Factor authentication","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"},{"label":"Security & Authentication","emoji":"1f510"}]},{"id":"5vSXYr2L1cbEX6BOejcq","title":"SSO with SAML","pathname":"/company-guide/company-settings/security-and-authentication/sso-with-saml","siteSpaceId":"sitesp_qrLvz","description":"BugBase offers Single Sign-on through SAML ( Security Assertion Markup Language ) Integration with Okta and Google.","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"},{"label":"Security & Authentication","emoji":"1f510"}]},{"id":"zUrt0xNbIQbt223Mdwkm","title":"Okta SSO setup via SAML","pathname":"/company-guide/company-settings/security-and-authentication/sso-with-saml/okta-sso-setup-via-saml","siteSpaceId":"sitesp_qrLvz","description":"You can use your Okta credentials to sign in to BugBase.","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"},{"label":"Security & Authentication","emoji":"1f510"},{"label":"SSO with SAML"}]},{"id":"ZF8518TdPcgUsCNmld5H","title":"Google SSO setup via SAML","pathname":"/company-guide/company-settings/security-and-authentication/sso-with-saml/google-sso-setup-via-saml","siteSpaceId":"sitesp_qrLvz","description":"You can use your Google credentials to sign in to BugBase.","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"},{"label":"Security & Authentication","emoji":"1f510"},{"label":"SSO with SAML"}]},{"id":"nqWk3mPCKC09aiRmeoPg","title":"Customization","pathname":"/company-guide/company-settings/customization","siteSpaceId":"sitesp_qrLvz","emoji":"1f3a8","description":"At BugBase we provide customization options to make your workflows easy","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"}]},{"id":"gVqZ6haPnctSQBgFvk7z","title":"Automations","pathname":"/company-guide/company-settings/customization/automations","siteSpaceId":"sitesp_qrLvz","description":"Automations provide the ability to automate your processes in BugBase.","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"},{"label":"Customization","emoji":"1f3a8"}]},{"id":"G4n3DVOxBHeBhCX8hjD8","title":"Report Tags","pathname":"/company-guide/company-settings/customization/report-tags","siteSpaceId":"sitesp_qrLvz","description":"Effortlessly organize and manage reports using Report Tags, a feature designed for easy categorization and filtering of bug reports.","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"},{"label":"Customization","emoji":"1f3a8"}]},{"id":"VK0IOPWRrZYOqUI3g54F","title":"Manage Access","pathname":"/company-guide/company-settings/manage-access","siteSpaceId":"sitesp_qrLvz","emoji":"1f4d9","description":"Invite users in your organization and give them roles to manage certain parts of your BugBase Company Account","breadcrumbs":[{"label":"Company Guide"},{"label":"Company Settings","emoji":"2699"}]},{"id":"khuNinhRSsg6GMasZsmw","title":"Insights Dashboard","pathname":"/company-guide/insights-dashboard","siteSpaceId":"sitesp_qrLvz","emoji":"1f4c8","description":"The insights dashboard provides a comprehensive program overview","breadcrumbs":[{"label":"Company Guide"}]},{"id":"CVppEEmDgvkyI4GtZUjq","title":"Campaigns","pathname":"/company-guide/campaigns","siteSpaceId":"sitesp_qrLvz","emoji":"1f50a","description":"Start a Campaign for better outreach to bounty hunters!","breadcrumbs":[{"label":"Company Guide"}]},{"id":"09x9VposUh7Mh1Yf62sl","title":"Understanding Currencies Used in BugBase","pathname":"/company-guide/understanding-currencies-used-in-bugbase","siteSpaceId":"sitesp_qrLvz","emoji":"1f4b2","description":"","breadcrumbs":[{"label":"Company Guide"}]},{"id":"lebbaxzgNgPb2hohfvGB","title":"Whitelist","pathname":"/company-guide/whitelist","siteSpaceId":"sitesp_qrLvz","emoji":"1f91d","description":"Enabling, managing, and processing whitelist requests for in-scope assets.","breadcrumbs":[{"label":"Company Guide"}]},{"id":"pmFcf7IQFdjGYgKmszXC","title":"Bug Bounty Dashboard","pathname":"/program-guide/bug-bounty-dashboard","siteSpaceId":"sitesp_qrLvz","description":"Bug Bounty or VDP Dashboard allows program managers to view important information about the status of their bug bounty program, helping them to easily track and manage the program.","breadcrumbs":[{"label":"Program guide"}]},{"id":"sR1CugWaHKHaAttkIuxg","title":"Program Reports Section","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section","siteSpaceId":"sitesp_qrLvz","description":"The Reports section in BugBase acts as an inbox for all the reports submitted to the program.","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"}]},{"id":"O0JbOIgRaHYZS9Mt8Y48","title":"Report Components","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section/report-components","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Reports Section"}]},{"id":"oqGGpBsMOGT14INnPhOx","title":"Report Actions","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section/report-actions","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Reports Section"}]},{"id":"nyqlEPBx1RGf2nR336UP","title":"Duplicating Reports","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section/duplicating-reports","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Reports Section"}]},{"id":"dGSPgWqhP4cXlV52uC4O","title":"Assigning Swags","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section/assigning-swags","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Reports Section"}]},{"id":"GVjRKuePTpqrBVhgHUPq","title":"Assigning Bounties","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section/assigning-bounties","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Reports Section"}]},{"id":"YrwG5mCjVTxEMOcwb7Hi","title":"Assigning Thanks to Reporters","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section/assigning-thanks-to-reporters","siteSpaceId":"sitesp_qrLvz","description":"Acknowledge Efforts & Valuable Contributions of Bug Reporters by sending them a Thanks Message","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Reports Section"}]},{"id":"tVtYNtXDUKKigRN9mN5X","title":"Assigning Bonus Bounty","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section/assigning-bonus-bounty","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Reports Section"}]},{"id":"cvPX73CzO7Okeu17fHNz","title":"Automatic Response Generator using ChatGPT","pathname":"/program-guide/bug-bounty-dashboard/program-reports-section/automatic-response-generator-using-chatgpt","siteSpaceId":"sitesp_qrLvz","description":"The Automatic Response Generator is a new feature in our app that allows to generate automatic responses using ChatGPT.","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Reports Section"}]},{"id":"N2IOsJjAZCfZAg2y6YA1","title":"Program Policy","pathname":"/program-guide/bug-bounty-dashboard/program-policy","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"}]},{"id":"MqfVg4d2ojcARVqLKCUT","title":"Editing Program Policy","pathname":"/program-guide/bug-bounty-dashboard/program-policy/editing-program-policy","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Policy"}]},{"id":"RlNRpqz1zhnWfDDUKOWN","title":"Best Practices For Designing Policy","pathname":"/program-guide/bug-bounty-dashboard/program-policy/editing-program-policy/best-practices-for-designing-policy","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Policy"},{"label":"Editing Program Policy"}]},{"id":"OtUnpdBPdqAHjl5L6JEw","title":"Best Practices For Bounty Tables","pathname":"/program-guide/bug-bounty-dashboard/program-policy/editing-program-policy/best-practices-for-bounty-tables","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"},{"label":"Program Policy"},{"label":"Editing Program Policy"}]},{"id":"UQ5UsbkqAwyeCeOv6n2E","title":"Payouts","pathname":"/program-guide/bug-bounty-dashboard/payouts","siteSpaceId":"sitesp_qrLvz","description":"View and Track Payments and Rewards assigned to researchers at one place","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"}]},{"id":"WWdk5BXLtd4vliFDWA0z","title":"Settings","pathname":"/program-guide/bug-bounty-dashboard/settings","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Bug Bounty Dashboard"}]},{"id":"XicZ5pT2NK8dQtX1pNVN","title":"Private Bug Bounty Dashboard","pathname":"/program-guide/private-bug-bounty-dashboard","siteSpaceId":"sitesp_qrLvz","description":"Private Bug Bounty Dashboard allows program managers to view important information about the status of their program, helping them to easily track and manage their program.","breadcrumbs":[{"label":"Program guide"}]},{"id":"wXZubSGIPuWf4o5ALavr","title":"Invite Hackers","pathname":"/program-guide/private-bug-bounty-dashboard/invite-hackers","siteSpaceId":"sitesp_qrLvz","description":"Only available on the Private Bug Bounty Programs","breadcrumbs":[{"label":"Program guide"},{"label":"Private Bug Bounty Dashboard"}]},{"id":"zNPbuteI07ohgFQoxJ8K","title":"Manage Credentials","pathname":"/program-guide/private-bug-bounty-dashboard/manage-credentials","siteSpaceId":"sitesp_qrLvz","description":"Only available on the Private Bug Bounty Programs","breadcrumbs":[{"label":"Program guide"},{"label":"Private Bug Bounty Dashboard"}]},{"id":"rBJdws77IJ4geUkpWfi1","title":"VDP Dashboard","pathname":"/program-guide/vdp-dashboard","siteSpaceId":"sitesp_qrLvz","description":"VDP Dashboard allows program managers to view important information about the status of their program, helping them to easily track and manage their program.","breadcrumbs":[{"label":"Program guide"}]},{"id":"QDfayps4aiNi7S6hMBjj","title":"Pentest Dashboard","pathname":"/program-guide/pentest-dashboard","siteSpaceId":"sitesp_qrLvz","description":"The Pentest Dashboard on BugBase allows program managers to easily track and manage their ongoing pentests.","breadcrumbs":[{"label":"Program guide"}]},{"id":"cK4bZMtWRyiqigNmjtJk","title":"Pentest Overview","pathname":"/program-guide/pentest-dashboard/pentest-overview","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Pentest Dashboard"}]},{"id":"HTUKAz81voGOqn66GEOU","title":"Vulnerabilities Section","pathname":"/program-guide/pentest-dashboard/vulnerabilities-section","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Pentest Dashboard"}]},{"id":"W83HcF5L79bMJCD30w7Z","title":"Pentest Report Components","pathname":"/program-guide/pentest-dashboard/vulnerabilities-section/pentest-report-components","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Pentest Dashboard"},{"label":"Vulnerabilities Section"}]},{"id":"oUmmKhPrQQefWze0Rslw","title":"Pentest Report Actions","pathname":"/program-guide/pentest-dashboard/vulnerabilities-section/pentest-report-actions","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Pentest Dashboard"},{"label":"Vulnerabilities Section"}]},{"id":"nfeobYi3TGI63yKI7jVB","title":"Global Pentest Chat","pathname":"/program-guide/pentest-dashboard/global-pentest-chat","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Pentest Dashboard"}]},{"id":"Vp1evwdnG9iF88utU1Nb","title":"Competition Dashboard","pathname":"/program-guide/competition-dashboard","siteSpaceId":"sitesp_qrLvz","description":"Host competitions to find out the best security talent from a pool of ethical hackers.","breadcrumbs":[{"label":"Program guide"}]},{"id":"FCmvFHdCpsspFbN2d3Y3","title":"Dashboard","pathname":"/program-guide/competition-dashboard/dashboard","siteSpaceId":"sitesp_qrLvz","description":"Create, manage and track all your competitions with our user-friendly interface.","breadcrumbs":[{"label":"Program guide"},{"label":"Competition Dashboard"}]},{"id":"Ryg0aidFnAS1TntmbNBS","title":"Creating a Competition","pathname":"/program-guide/competition-dashboard/creating-a-competition","siteSpaceId":"sitesp_qrLvz","description":"Find the best security talent from a pool of ethical hackers. Create and manage competitions with ease.","breadcrumbs":[{"label":"Program guide"},{"label":"Competition Dashboard"}]},{"id":"LIpo5O59n7VDmtgyYZIw","title":"Adding Challenges","pathname":"/program-guide/competition-dashboard/creating-a-competition/adding-challenges","siteSpaceId":"sitesp_qrLvz","description":"WIP","breadcrumbs":[{"label":"Program guide"},{"label":"Competition Dashboard"},{"label":"Creating a Competition"}]},{"id":"DsdbdmajR3PuCKDVBt8q","title":"Manage Competitions","pathname":"/program-guide/competition-dashboard/manage-competitions","siteSpaceId":"sitesp_qrLvz","description":"View insights and edit competition details","breadcrumbs":[{"label":"Program guide"},{"label":"Competition Dashboard"}]},{"id":"NckOONMQr0pJ81SWs6gp","title":"Statistics","pathname":"/program-guide/competition-dashboard/manage-competitions/statistics","siteSpaceId":"sitesp_qrLvz","description":"View all Competition Statistics in one place","breadcrumbs":[{"label":"Program guide"},{"label":"Competition Dashboard"},{"label":"Manage Competitions"}]},{"id":"YKUQFJpW42qWYxgMsfz0","title":"Leaderboard","pathname":"/program-guide/competition-dashboard/manage-competitions/leaderboard","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Competition Dashboard"},{"label":"Manage Competitions"}]},{"id":"wPxmZXWcr2SXD8aVN2V3","title":"Manage Users","pathname":"/program-guide/competition-dashboard/manage-competitions/manage-users","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Program guide"},{"label":"Competition Dashboard"},{"label":"Manage Competitions"}]},{"id":"WcP6KP8TSovNIeE5LnUw","title":"Bounty Hunter Dashboard","pathname":"/bounty-hunter-guide/bounty-hunter-dashboard","siteSpaceId":"sitesp_qrLvz","description":"Logged in Successfully!","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"CWZcblZQpBxPctRvsJpI","title":"Bounty Hunter Profile","pathname":"/bounty-hunter-guide/bounty-hunter-profile","siteSpaceId":"sitesp_qrLvz","description":"The Bugbase Hacker Profile Page is a comprehensive dashboard for cybersecurity researchers  participating in bug bounty programs.","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"JPUT5eMhzfghKxfRq1Eq","title":"Programs Directory","pathname":"/bounty-hunter-guide/programs-directory","siteSpaceId":"sitesp_qrLvz","description":"List of all Active Programs on BugBase","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"A9NnXaGcrqlctjGVJO6L","title":"Program Policy Page","pathname":"/bounty-hunter-guide/programs-directory/program-policy-page","siteSpaceId":"sitesp_qrLvz","description":"View Policy, Scope Groups, Credentials, Hall of Fame and Changelogs","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Programs Directory"}]},{"id":"9w73z6fYXTnxCtAZeJAK","title":"Credentials","pathname":"/bounty-hunter-guide/programs-directory/credentials","siteSpaceId":"sitesp_qrLvz","description":"Credentials are essential for gaining access to the program's assets and conducting any necessary testing.","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Programs Directory"}]},{"id":"6emRKCvdsdb8JEDmyENO","title":"VPN Access","pathname":"/bounty-hunter-guide/programs-directory/vpn-access","siteSpaceId":"sitesp_qrLvz","description":"VPN is essential to access the specified assets in the program. It's important to note that these assets cannot be accessed without connecting to a VPN.","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Programs Directory"}]},{"id":"RHT4fo66La0K4QSLPDc8","title":"Whitelist","pathname":"/bounty-hunter-guide/programs-directory/whitelist","siteSpaceId":"sitesp_qrLvz","description":"A step-by-step guide for hackers to request whitelisting for assets requiring credentials.","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Programs Directory"}]},{"id":"8FrfdqJmw9ooUXBQ58i1","title":"Collaborate","pathname":"/bounty-hunter-guide/programs-directory/collaborate","siteSpaceId":"sitesp_qrLvz","description":"Allowing and managing collaboration amongst bounty hunters within private programs.","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Programs Directory"}]},{"id":"pCMeuWsfVvEJ3zIndcIZ","title":"Bounty Hunter Reports Section","pathname":"/bounty-hunter-guide/bounty-hunter-reports-section","siteSpaceId":"sitesp_qrLvz","description":"View all reports categorised at one place to focus on what matters the most","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"qKpYR3UIda15roj1bQcg","title":"Submitting Reports","pathname":"/bounty-hunter-guide/bounty-hunter-reports-section/submitting-reports","siteSpaceId":"sitesp_qrLvz","description":"A good report starts with a warm and cozy greeting","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Bounty Hunter Reports Section"}]},{"id":"lFwUHxItyZaZ0IcX6jps","title":"Interaction with Program Representees","pathname":"/bounty-hunter-guide/bounty-hunter-reports-section/interaction-with-program-representees","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Bounty Hunter Reports Section"}]},{"id":"kd7ksprldhKSqm3Vk6HU","title":"Collaboration","pathname":"/bounty-hunter-guide/bounty-hunter-reports-section/collaboration","siteSpaceId":"sitesp_qrLvz","description":"Splitting bounties and working as a team!","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Bounty Hunter Reports Section"}]},{"id":"zhKhRdu4SAK1iaMa2kZZ","title":"Response Generation through ChatGPT on Report Chat","pathname":"/bounty-hunter-guide/bounty-hunter-reports-section/response-generation-through-chatgpt-on-report-chat","siteSpaceId":"sitesp_qrLvz","description":"The Response Generation is a new feature in our app that allows to generate responses using ChatGPT.","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Bounty Hunter Reports Section"}]},{"id":"D9vjnQFg2bXcpyfgrNBR","title":"Competitions","pathname":"/bounty-hunter-guide/competitions","siteSpaceId":"sitesp_qrLvz","description":"PwnTheWorld","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"VLX2xvKTwixBa3ojvyal","title":"Discord Community","pathname":"/bounty-hunter-guide/discord-community","siteSpaceId":"sitesp_qrLvz","description":"GG!","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"DFNg9W5k4QC3MJf6sNxg","title":"Leaderboard","pathname":"/bounty-hunter-guide/leaderboard","siteSpaceId":"sitesp_qrLvz","description":"Elite Hacker leaderboard","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"7QzR61rl8MppPWUjgVWX","title":"Multi-Factor Authentication","pathname":"/bounty-hunter-guide/multi-factor-authentication","siteSpaceId":"sitesp_qrLvz","description":"Secure your account with Multi-Factor authentication","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"2DFpKeLgyxXgCOuYpZvq","title":"Settings","pathname":"/bounty-hunter-guide/settings","siteSpaceId":"sitesp_qrLvz","description":"Manage your BugBase Bounty Hunter Account at once place","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"UrR1d8WRndsdoP8wYoH0","title":"Verify KYC","pathname":"/bounty-hunter-guide/settings/verify-kyc","siteSpaceId":"sitesp_qrLvz","description":"Hackers on our platform can now instantly verify their KYC. For seamless payments and instant transactions on bounties, companies require a certain level of KYC of the hacker to be verified.","breadcrumbs":[{"label":"Bounty Hunter Guide"},{"label":"Settings"}]},{"id":"NLkv8CrYUbvlaC5EVl6M","title":"Email Alias","pathname":"/bounty-hunter-guide/email-alias","siteSpaceId":"sitesp_qrLvz","description":"On Bugbase, hackers are assigned an email alias that redirects any emails to the primary email address they used to register with the platform.","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"tjklh5qEw0xS7PZBbk4e","title":"Apollo Community","pathname":"/bounty-hunter-guide/apollo-community","siteSpaceId":"sitesp_qrLvz","emoji":"1f680","description":"Join our private community of elite hackers and Enjoy access to exclusive private programs!","breadcrumbs":[{"label":"Bounty Hunter Guide"}]},{"id":"U4AWuanUszfuQywhb39A","title":"Supported Integrations","pathname":"/integrations/supported-integrations","siteSpaceId":"sitesp_qrLvz","emoji":"1f517","description":"Make BugBase a part of your SDLC!","breadcrumbs":[{"label":"Integrations"}]},{"id":"PXxpZcNqZoI6bYkQOLme","title":"Webhooks","pathname":"/integrations/webhooks","siteSpaceId":"sitesp_qrLvz","description":"Webhooks are Trigger based, notifications will be sent when a particular event occurs","breadcrumbs":[{"label":"Integrations"}]},{"id":"jgZC2hGjChPDiVEx6MwS","title":"JIRA","pathname":"/integrations/jira","siteSpaceId":"sitesp_qrLvz","description":"JIRA is a project management software that helps teams efficiently manage projects from start to finish. Our cross-sync integration lets you organize all your vulnerabilities data in one place","breadcrumbs":[{"label":"Integrations"}]},{"id":"fA6sihAjij8TFbXgZ4sg","title":"Creating a JIRA Issue","pathname":"/integrations/jira/creating-a-jira-issue","siteSpaceId":"sitesp_qrLvz","description":"How to create an issue on JIRA from BugBase","breadcrumbs":[{"label":"Integrations"},{"label":"JIRA"}]},{"id":"DvOtt3DhiAaTGQuQc1Xq","title":"Slack","pathname":"/integrations/slack","siteSpaceId":"sitesp_qrLvz","description":"BugBase offers integration with Slack which is trigger based and will send a notification only when an event occurs on your BugBase program.","breadcrumbs":[{"label":"Integrations"}]},{"id":"Ost60p85XQ9m6Lr0zwVs","title":"Managing Integration","pathname":"/integrations/slack/managing-integration","siteSpaceId":"sitesp_qrLvz","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Slack"}]},{"id":"4CfotwzonSXn1VWh7Uje","title":"Microsoft Teams","pathname":"/integrations/microsoft-teams","siteSpaceId":"sitesp_qrLvz","description":"Microsoft Teams (MS Teams) is a trigger based integration.","breadcrumbs":[{"label":"Integrations"}]},{"id":"2EwqK5PsxA0nUUte8Lxf","title":"Github","pathname":"/integrations/github","siteSpaceId":"sitesp_qrLvz","description":"You can create issues on Github directly from BugBase","breadcrumbs":[{"label":"Integrations"}]},{"id":"9zeZkkBlQF7jgg7ZKpG7","title":"Asana","pathname":"/integrations/asana","siteSpaceId":"sitesp_qrLvz","description":"You can create issues on Asana directly from BugBase","breadcrumbs":[{"label":"Integrations"}]},{"id":"0ur2XJGtcQTvgvyslE6A","title":"Sumo Logic","pathname":"/integrations/sumo-logic","siteSpaceId":"sitesp_qrLvz","description":"Log Events from BugBase seamlessly using the SumoLogic integration","breadcrumbs":[{"label":"Integrations"}]},{"id":"neXz6DQIo6aRnWsx2BFr","title":"PagerDuty","pathname":"/integrations/pagerduty","siteSpaceId":"sitesp_qrLvz","description":"PagerDuty Integration enables incidents to be created each time a new report is submitted on BugBase","breadcrumbs":[{"label":"Integrations"}]},{"id":"xzLG8uZazafH3Df8JDhl","title":"Running Automated Testing","pathname":"/on-premise/running-automated-testing","siteSpaceId":"sitesp_qrLvz","description":"BugBase includes an automated vulnerability detection tool called BATS (BugBase Automated Testing Suite) to identify common security vulnerabilities.","breadcrumbs":[{"label":"on-premise"}]},{"id":"dHWJgBUsXXSZAUYifvEJ","title":"Sandbox Environment","pathname":"/on-premise/sandbox-environment","siteSpaceId":"sitesp_qrLvz","description":"As part of our on-premises deployment option, we offer a dedicated sandbox instance with robust tools for testing and reproducing bug reports","breadcrumbs":[{"label":"on-premise"}]}]}