Bug bounty methodology

Preparations

Scoping

Vulnerability Classification

Participant Engagement

Vulnerability Reporting

Triage and Remediation

Rewards and Recognition

Program Evaluation

Program Continuity

Related Checklists