Otacon - Research & Development
  • Welcome
  • Overview
  • Cybersecurity
    • Landscape
    • Attacks
    • Damage
    • Defenses
    • Outlook
  • Bounty
    • Programs
    • Manual
    • Assisted by Computers
    • Assisted by Humans
  • Otacon
    • Overview
    • Bug Scanning
    • Bug-to-Token Conversion
    • Proof of Concept
    • Submission
    • Revenue Share
    • Revenue Modifiers
  • Future
    • Scanning Accuracy
    • Scanning Agency
    • Roadmap
  • More
    • Tokenomics
      • OTACON Utility
      • OTACON Supply
      • OTACON Allocation
      • OTACON Fees
      • OTACON Burn
    • Smart Contracts
    • Liquidity Management
    • Team
  • Otacon [version 1.0]
    • Bug Bounty Management
    • Beta Test Plan
    • Bug Bounty Simulations
Powered by GitBook
On this page
  1. Bounty

Assisted by Computers

Bounty Programs can by assisted by computers through the use of a third-party, centralized Bug Bounty platform.

Most steps of the Vulnerability Management workflow are handled through a software application, that guide the Bounty Program stakeholders through a collaborative pipeline until the settlement of the Bug Report submission.

While doing some of the heavy lifting, Bug Bounty Hunting platforms do not automate Bug Scanning, Proof of Concept, and the other labor-intenstive parts of the Bug Bounty Hunt, and are not immediately a good fit for novice enthusiasts.

PreviousManualNextAssisted by Humans

Last updated 1 year ago