skip to Main Content

Congratulations to our most dedicated researchers in Q1 2019!

Congratulations To Our Most Dedicated Researchers In Q1 2019!

Earlier this year, we announced our new incentive programs to recognize shining stars in our researcher community. Today, we’re more than excited to announce our Q1 2019 Bounty Slayers!

The Bounty Slayers program strongly encourages continued performance on our platform by rewarding valid P1 to P4 submissions*. Valid submissions are those that are accepted and marked as “Unresolved,” “Resolved,” “Duplicate,” or “Won’t Fix.”

After reviewing the results in Q1, we gathered a few major takeaways. First, you guys are an incredibly impressive Crowd; we’ve seen so much amazing work! Second, we are going to be paying out a high volume of incentive rewards! Third, we have room to improve this program.

This was the first quarter we rolled out such an incentive program and it has been a tremendous learning experience for all of us at Bugcrowd. Using what we’ve learned, we know we have to make some changes to the program to allow it to truly become the exciting and challenging program we intended it to be.

Currently, there are two reward structures to this program. The first is the standard rewards – submit at least 10 valid P1 to P4 submissions in any given calendar quarter and get rewarded based on the number of quarters you have qualified. The second is the Power Up bonus, which is designed for those who want the extra challenge and cash rewards! Instead of 10 valid submissions, this advanced level requires you to submit at least 15 valid submissions to qualify. Also note that the bonus in the two reward structures do not stack.

Starting in Q2, we are going to tweak the program by providing you all with bigger stretch goals. To qualify for the standard rewards, you must now submit at least 40 valid P1 to P4 submissions. For the Power Up bonus, you must now submit at least 60 valid P1 to P4 submissions.

We were extremely thrilled with the performance of the Crowd­, but we are confident that these new changes will allow this to become the challenging program you all had expected. And moving ahead, the program will also be subject to additional changes as we continue to learn from our Crowd.

Without further ado, here are the Q1 2019 winners!

The following researchers have submitted at least 10 valid submissions:

  • 0cean
  • ahsantahir
  • akashpawar
  • allyomalley
  • Arcot_Manju
  • ARKADA
  • Aryan_2808
  • aslages
  • atik-rahman
  • Avanish
  • badf00d
  • Bitquark
  • chiraggupta8769
  • Cyb3rlant3rn
  • damian89
  • DEAD_HUNTER
  • Digvijay
  • djamel-ghorab
  • EgiX
  • eur0pa
  • gab
  • GabiCosta
  • Ghost_hacker
  • ghostin
  • Gopalsingh
  • hateshape
  • HritikSH
  • hun10sta
  • its_comrex
  • kadusantiago
  • kamalinux
  • Kenan
  • Khushbu1112
  • kiddie
  • Kiranbattaluri
  • Kishore_Hariram
  • kudanil
  • Lfb
  • midhunk
  • mkzreport
  • mrd7
  • musashi42
  • n0ps
  • ngocdh
  • Nigel
  • Niggy
  • nijagaw
  • noobie-boy
  • omachi
  • OpptimusP
  • pa1_tambe
  • pentester2803
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Rituraj8898
  • rootbakar
  • rugb
  • sagaryadav8742
  • sameerphad72
  • ShubhamParakh
  • smackerdodi
  • sritarun3
  • streaak
  • stylishhacker
  • superevr
  • surendiran
  • Suyash_777
  • tabahi
  • Tech_hacker
  • thomas_shellby
  • tsugumo
  • uday3421
  • velocity007
  • vhssunny1
  • VirendraYadav
  • z0mbi3Kill3r
  • zeroauth

The following researchers have submitted at least 15 valid submissions:

  • _n1_
  • 0ang3el
  • 1N3
  • 4kash_s4rkar
  • Abdullah-bigshow
  • Abhishek_Karle
  • ahmedehane
  • ahmet
  • Akmall
  • AnkitSingh
  • Anon_Hunter
  • ansariosama
  • Anub1s
  • aparecekarl
  • B3nac_Sec
  • bilalkhan
  • binit
  • blum
  • boomzkik
  • CyberTiger
  • D_J
  • danzajork
  • DDV_UA
  • dedsec69
  • Dipen
  • dirty0124
  • edwinmolenaar
  • elmahdi
  • euler42
  • Evren
  • Faisal_HFR
  • FaisalShaikh
  • Gauravn1997
  • h4ckologic
  • Harie_cool
  • harisec
  • HPx
  • iotmaster
  • Itachi_Uchiha
  • JonathanBouman
  • JR0ch17
  • k3r1it0
  • lccunha
  • Lethal
  • lopseg
  • m4ll0k
  • madboy
  • mert
  • Mikee
  • MorningStar
  • MuhammadKhizerJaved
  • nikhil0786
  • Nikhilshinde
  • nikketan
  • noob
  • nooboy
  • noobwalid
  • nullenc0de
  • nuraalamdipu
  • onurgurbuz
  • osamaavvan
  • pradeepch99
  • pravinghanwat3004
  • prial261
  • Pritam_Singh
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • Private user
  • QasimShaikh
  • rajandinkar
  • rakeshmane
  • ranjan786
  • restricted
  • S4thi5h
  • SaadAhmed
  • script_ruby
  • seren
  • Sh_O_Aib
  • Shahzad_Sadiq
  • shubhack319
  • Softwaroid
  • Ssec
  • Suyog
  • th3g3nt3lman
  • todayisnew
  • ugur
  • Vasil
  • VINOTHKUMAR
  • Vishnu_Vardhan_Reddy
  • x00x90
  • Xaliom
  • XploiteR_D
  • ynsy
  • YotamC
  • YumiSec
  • Zacda
  • zseano

Thank you all for your fantastic work! At Bugcrowd, we recognize the value and take pride in rewarding our exceptional researchers. We will be processing rewards shortly.

Visit here to learn more about the program. If you have any questions, please do not hesitate to reach out to support@bugcrowd.com.

 

*Please note that this is not an ongoing program. Results run annually from January 1, 2019 to December 31, 2019.

Tags:
Topics:
Back To Top