Talented and trusted.

We make sure you get the right mix of expertise for your managed crowdsourced security programs. Researchers always receive 100% of earned bounties, ensuring proper incentives.

An Elite Crowd

Four key attributes are used to assess, select and evaluate researcher performance on an on-going basis.

Quality

How often submissions are accepted as “valid” by a program owner - researchers must maintain an acceptance rate of 50% or higher.

Activity

Frequency of a researcher’s submissions - only considered active if a submission has been made within the last 90 days.

Impact

Criticality and impact of vulnerability submissions, measured between 1.0 (critical) and 5.0 (low) - minimum priority rate of 3.99 required.

Trust

Maintaining a track record of staying inside scope of a bounty brief, following terms, and honoring all nondisclosure requirements.

clippingpath

An Elite Crowd

Four key attributes are used to assess, select and evaluate researcher performance on an on-going basis.

Quality

How often submissions are accepted as “valid” by a program owner - researchers must maintain an acceptance rate of 50% or higher.

Activity

Frequency of a researcher’s submissions - only considered active if a submission has been made within the last 90 days.

Impact

Criticality and impact of vulnerability submissions, measured between 1.0 (critical) and 5.0 (low) - minimum priority rate of 3.99 required.

Trust

Maintaining a track record of staying inside scope of a bounty brief, following terms, and honoring all nondisclosure requirements.

What Can The Crowd Test?

  • Network Appliances
  • IOT & Firmware
  • Web Apps
  • Mobile Apps
  • APIs
  • Network Infrastructure

Researcher Spotlight

Get to know a few of our most talented white-hat hackers.