Skip to content
This repository has been archived by the owner on Nov 20, 2023. It is now read-only.

Commit

Permalink
Merge pull request #1148 from Hacker0x01/68159-update-invitations-docs
Browse files Browse the repository at this point in the history
Add invitation algorithm details to invitation docs
  • Loading branch information
stijnvanderpol committed Sep 12, 2023
2 parents 0f1de7a + 7e5da8e commit 97d9cc8
Show file tree
Hide file tree
Showing 4 changed files with 30 additions and 7 deletions.
Binary file removed docs/hackers/images/invitation-preferences-2.png
Binary file not shown.
Binary file added docs/hackers/images/invitation-preferences-3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion docs/hackers/invitations.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,4 +45,4 @@ Pause private program invitations until | Enter the date you want to stop receiv
Cryptocurrency preferences | Select *yes* to opt-out from receiving cryptocurrency program invitations. <br><br>*This field is currently in beta*
Bounty preferences | Select *yes* to only receive invitations to programs that award a bounty. <br><br>*(Currently in beta)* Move the slider to indicate the minimum bounty amount for critical severity bugs for programs you’d like to receive invitations from.

![invitation-preferences](./images/invitation-preferences-2.png)
![invitation-preferences](./images/invitation-preferences-3.png)
35 changes: 29 additions & 6 deletions docs/organizations/invitations.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ id: "organizations/invitations"
In order for hackers to hack on private programs, they must receive invitations. Hackers are able to receive invitations if they meet the following criteria:
* Established reputation
* Non-negative signal
* Clear record with zero code of conduct violations
* Clear record with zero Code of Conduct violations

HackerOne manages your invitations by:
* Daily checking to see if your program has met your report volume target in the last 30 days
Expand All @@ -25,6 +25,29 @@ Your report volume is set to 0. | No invitations will be sent.

><i>Note: HackerOne will be sure to prevent you from being overwhelmed with reports.</i>
#### Technically

Our invitations system relies on an internal hacker invitation algorithm that runs periodically. It will find the right hackers based on your needs at the right time.

It will take into account a few optional parameters to be configured with your assigned Customer Success Manager (CSM):

- Success goals
- Signal requirements
- Identity Verification and Background Check requirements
- Reputation requirements
- Country restrictions

The algorithm sifts through millions of hackers, identifying those who meet your criteria and have proven their value with at least 1 valid report or more than [25 CTF points](https://ctf.hacker101.com/).

The algorithm calculates the likelihood of a hacker finding vulnerabilities in your program and optimizes invitations accordingly. Some attributes include:

- Scope
- Program launch date
- Reward amounts
- Hacker submission history
- Hacker experience
- Hacker preferences

### Setting Invitations
To set your invitations:
1. Go to **Engagements > Settings > Program > Invitations**.
Expand All @@ -36,22 +59,22 @@ To set your invitations:

><i>Note: Manual invitations are only applicable for Bug Bounty Programs.</i>
Sometimes you might want to issue your own invitations to hackers. If you need to issue your own invitations to particular hackers as an exception:
If you need to issue your own invitations to particular hackers as an exception:
1. Go to **Engagements > Settings > Program > Invitations**.
2. Select how you want to invite the hacker in the sentence that starts with **Manually invite a hacker by**. You can choose to invite a hacker by selecting either:
2. Select how you want to invite the hacker in **Manually invite a hacker by email or username**. You can choose to invite a hacker by selecting either:
* Email
* Username
* Reputation
3. This will open a pop-up window where you can enter the email address or username of the hacker you want to invite. You will also be required to enter an **invitation message** as well as a **context** option explaining the invitation reason.

![invitations](./images/invitations.png)

HackerOne doesn’t recommend inviting unknown hackers. If a hacker has reached out to request an invitation to your private program, contact HackerOne as this is a clear violation of Disclosure Guidelines.

### Managing Invitations
You can keep track of your invitations and which hackers have been invited to your program.
* The **Invited Hackers** section lists all of the hackers that have accepted invitations. You can select Remove next to the hacker you want to remove from your program.
* The **Invited Hackers** section lists all of the hackers that have accepted invitations. To remove a hacker, go to a report the hacker has submitted and select the **Ban reporter** action to the right of the comment field.
* In the **Pending Invitations** section, you can cancel pending invitations.
* Download your invitation status to CSV from the **Program Invites Card** on Program Overview page. The CSV will have the following columns:
* Download your invitation status to CSV from the Program Invites Card on Program Overview page. The CSV will have the following columns:
* Username
* Invite Sent At
* Invite Accepted At
Expand Down

0 comments on commit 97d9cc8

Please sign in to comment.