You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title | Yes | The title of the vulnerability report | Any string < 150 characters | Reflected XSS on q parameter at search.example.com
22
-
description | Yes | All information required in order to reproduce the vulnerability and understand the impact. Include any relevant endpoints and parameters. As this is a multi-line field, wrap your input in quotes. | Any multi-line string | "# Summary <p><p>The endpoint at `xxx` is vulnerable to refected cross-site scripting on the `xxx` parameter. <p><p> # Steps to reproduce <li>Go to `xxx.com`<li>Notice the alert"
23
-
state | Yes | Whether the report is open or closed | The word *Open* or *Closed* | Open
24
-
substate | Yes | The specific [substate](report-states.html) of the report - whether the report is *new, triaged, resolved,* etc. | You can choose from: *new, triaged, needs-more-info, resolved, not applicable, duplicate* | triaged
25
-
hacker_email | No | The email address of the hacker. By including the email address, HackerOne is able to send an invite to the hacker to claim any report they've submitted. | A valid email address | user@example.com
26
-
severity_score | No | The [severity](severity.html) rating of the report. | A decimal number between 0-10 | 7.2
27
-
priority | No | The severity rating description label. | You can choose from: *none, low, medium, high, critical* | medium
28
-
view\_reference\_url | No | The link to the report in your ticketing system (when the reference URL integration is not set up). | A valid URL | https://example.jira.com/eng/BBP-1234
29
-
reference | No | The reference to the report in your ticketing system. | A string | BBP-1234
30
-
asset_identifier | No| The asset identifier that can be linked to an asset defined on HackerOne. | A string | ".hackerone.com"
31
-
weakness_name | No | The name of the [weakness](/hackers/weakness.html) for the vulnerability. You can choose from HackerOne's subset list from the Common Weakness Enumeration (CWE)list. | A string matching the name from the CWE list | Cross-Site Request Forgery (CSRF)
32
-
created_at | Yes if the report state is not *closed* | The timestamp of when the report was submitted | Timestamp in the format: YYYY-MM-DD <p><p>You can also include hours/minutes in 24-hour format: HH:MM | 2020-09-18
33
-
triaged_at | Yes if the report state is not *closed* | The timestamp of when the submission was triaged. | Timestamp in the format: YYYY-MM-DD <p><p>You can also include hours/minutes in 24-hour format: HH:MM | 2020-09-18
34
-
closed_at | No | The timestamp the submission was closed. | Timestamp in the format: YYYY-MM-DD <p><p>You can also include hours/minutes in 24-hour format: HH:MM | 2020-09-18
title | *(Required)* The title of the vulnerability report | Any string < 150 characters | Reflected XSS on q parameter at search.example.com
22
+
description | *(Required)*All information required in order to reproduce the vulnerability and understand the impact. Include any relevant endpoints and parameters. As this is a multi-line field, wrap your input in quotes. | Any multi-line string | "# Summary <p><p>The endpoint at `xxx` is vulnerable to reflected cross-site scripting on the `xxx` parameter. <p><p> # Steps to reproduce <li>Go to `xxx.com`<li>Notice the alert"
23
+
state | *(Required)* Whether the report is open or closed | The word *Open* or *Closed* | Open
24
+
substate | *(Required)* The specific [substate](report-states.html) of the report - whether the report is *new, triaged, resolved,* etc. | You can choose from: *new, triaged, needs-more-info, resolved, not applicable, duplicate* | triaged
25
+
hacker_email | *(Optional)* The email address of the hacker. By including the email address, HackerOne is able to send an invite to the hacker to claim any report they've submitted. | A valid email address | user@example.com
26
+
severity_score | *(Optional)* The [severity](severity.html) rating of the report. | A decimal number between 0-10 | 7.2
27
+
priority | *(Optional)* The severity rating description label. | You can choose from: *none, low, medium, high, critical* | medium
28
+
view\_reference\_url | *(Optional)* The link to the report in your ticketing system (when the reference URL integration is not set up). | A valid URL | https://example.jira.com/eng/BBP-1234
29
+
reference | *(Optional)* The reference to the report in your ticketing system. | A string | BBP-1234
30
+
asset_identifier | *(Optional)* The asset identifier that can be linked to an asset defined on HackerOne. | A string | ".hackerone.com"
31
+
weakness_name | *(Optional)* The name of the [weakness](/hackers/weakness.html) for the vulnerability. You can choose from HackerOne's subset list from the Common Weakness Enumeration (CWE)list. | A string matching the name from the CWE list | Cross-Site Request Forgery (CSRF)
32
+
created_at | *(Required field if the report state isn't closed)* The timestamp of when the report was submitted | Timestamp in the format: YYYY-MM-DD <p><p>You can also include hours/minutes in 24-hour format: HH:MM | 2020-09-18
33
+
triaged_at | *(Required field if the report state isn't closed)* The timestamp of when the submission was triaged. | Timestamp in the format: YYYY-MM-DD <p><p>You can also include hours/minutes in 24-hour format: HH:MM | 2020-09-18
34
+
closed_at | *(Optional)* The timestamp the submission was closed. | Timestamp in the format: YYYY-MM-DD <p><p>You can also include hours/minutes in 24-hour format: HH:MM | 2020-09-18
0 commit comments