Contact us and ask about our bug bounty management program Our Consultants will start the onboarding process straight away.
Together we start with establishing the scope of permitted testing & the target website(s)
Together we draft the initial responsible disclosure policies.
Upload the final agreed upon responsible disclosure policy to your web application
Place our CERT / disclosure email address on the designated responsible disclosure page. Place our public encryption key on your responsible disclosure(assures secure communication)
When a potential vulnerability has been submitted, our certified IT Security consultants will:
Based on the severity of the vulnerability, it is at your discretion to reward the external research for finding and reporting the vulnerability.
Blueprint's consultants will be available, if needed, to provide additional aftercare and support