For Partners
Structured and Simplified Bug Bounties
We guide you through the entire process of starting, managing, and successfully running your bug bounty program.
Fast and Accurate Triage Reports
Consulting and technical experts review each reported vulnerability to verify its impact and risk.
Trusted White Hat Hackers Only
Make sure only trusted white hat hackers participate in your bug bounty through the use of e-contracts and private VPNs. Use log-based verification to detect and sanction policy violations for a safe program.
Private Bug Bounties for Full Confidentiality
Safely carry out bug bounty programs for non-public services, such as in-house services and pre-deployment services, with a pool of white hat hackers whose identities and skills are already verified by our team.
For White Hat Hackers
Multiplying Rewards
With each reported vulnerability, white hat hackers can earn MVH points that can be exchanged for bounty bonuses, conference tickets, and other exclusive benefits.
Largest Bounty in the Country
Get the reward you deserve for your contribution in the largest bounty programs, only available on PatchDay.
Vulnerability Report Guidelines
Identify the vulnerability type(CWE) and severity(CVSS) with just a simple click to write faster reports.