File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change @@ -9,7 +9,7 @@ A bounty table shows how much your program is willing to pay for various bugs yo
9
9
To set up and publish your bounty table on your security page:
10
10
11
11
1 . Go to your program’s ** Settings > Rewards > Bounties** .
12
- 2 . <i >Optional</i > Edit the column names of the bounty table that best fit the reward structure of your program under the ** Bounty Table** section.
12
+ 2 . <i >( Optional) </i > Edit the column names of the bounty table that best fit the reward structure of your program under the ** Bounty Table** section.
13
13
3 . Input your bounty amounts under each column.
14
14
* Note: Critical vulnerabilities should have the highest bounty amount whereas a severity rating of Low should have the lowest amount.
15
15
4 . <i >(Optional)</i > Add a description about how severity is determined or examples of what types of bugs fall into which category.
You can’t perform that action at this time.
0 commit comments