Learn how to effectively triage and respond to security reports
Effective triaging is essential for maintaining a successful bug bounty program. It ensures that security issues are properly evaluated, prioritized, and resolved while building positive relationships with Bug Hunters.
The first step in the triage process is a quick assessment to determine whether a report requires further investigation.
Check whether the reported vulnerability affects an asset within your defined scope:
Determine whether the report describes a genuine security issue:
Check whether the vulnerability has been previously reported:
Accurately assessing severity is crucial for prioritizing fixes and determining bounty rewards.
Bugbop uses a simplified version of the Common Vulnerability Scoring System (CVSS) to evaluate report severity:
Factor | High (3 points) | Medium (2 points) | Low (1 point) |
---|---|---|---|
Impact | Complete compromise of system, data breach, full control | Significant data leak, functionality compromise | Minor information disclosure, limited impact |
Exploitability | Remote, no authentication, easily automated | Requires low privilege account, some complexity | Requires specific access, complex conditions |
Asset Criticality | Authentication system, payment processing, PII | User account management, non-critical data | Marketing pages, non-sensitive content |
Calculate severity by adding the points from each category:
Clear, respectful, and timely communication with security researchers is essential for a successful bug bounty program.
For every valid report, your first communication should include:
Keep researchers informed throughout the resolution process:
When declining reports, provide constructive feedback:
Once a vulnerability is confirmed, coordinate with the development team to plan and implement fixes.
Work with technical teams to determine fix priority based on:
Before closing a report, ensure the vulnerability has been properly fixed:
While waiting for a permanent fix, consider implementing:
Once a vulnerability has been fixed, it's time to close the report and determine appropriate rewards.
When deciding on bounty amounts, consider:
When closing a report, include:
Consider additional ways to recognize valuable contributions:
To maintain consistency and save time, use these customizable templates for common scenarios.
"Hi [Researcher],
Thank you for submitting this report. I've begun investigating your findings and will update you on our progress within [timeframe, e.g., 2-3 business days].
If you have any additional information that might help with our investigation, please let me know.
Thanks,
[Your Name]
[Program Name] Team"
"Hi [Researcher],
Thank you for your report. To help us better understand and reproduce this issue, could you please provide the following additional information:
• [Specific detail needed]
• [Specific detail needed]
• [Specific detail needed]
This will help us properly assess the vulnerability and determine next steps.
Thanks,
[Your Name]
[Program Name] Team"
"Hi [Researcher],
We've completed our investigation and confirmed this is a valid vulnerability. Thank you for your careful work on this report.
We've classified this as a [Severity Level] issue and have assigned it to our development team for remediation. We expect to have a fix implemented by approximately [date].
I'll keep you updated on our progress and let you know once the fix has been deployed.
Thanks again for helping improve our security,
[Your Name]
[Program Name] Team"
"Hi [Researcher],
Thank you for your submission. After careful review, we've determined that this report doesn't qualify for a bounty because [specific reason].
[Provide specific technical explanation]
We appreciate your participation in our program and encourage you to continue submitting reports. For future submissions, you might want to consider [helpful suggestion].
Thanks,
[Your Name]
[Program Name] Team"
"Hi [Researcher],
Thank you for your report. We've determined that this vulnerability was previously reported by another researcher on [date], and we're already working on a fix.
While this specific report won't qualify for a bounty as a duplicate, we still appreciate your effort in finding and reporting this issue. Please continue to participate in our program.
Thanks,
[Your Name]
[Program Name] Team"
"Hi [Researcher],
Great news! We've successfully deployed a fix for the vulnerability you reported. The issue was resolved by [brief description of fix if appropriate].
Based on our assessment, we're awarding you a bounty of [amount] for this report. The payment will be processed within [timeframe].
Thank you again for your valuable contribution to our security. We greatly appreciate your help in making our platform safer for all users.
Best regards,
[Your Name]
[Program Name] Team"