HOW-TO GUIDE | APPLICATION SECURITY
Active Threat10 min read

How to Build a Vulnerability Disclosure Program or Bug Bounty

84%
Of HackerOne researchers say safe harbor language determines whether they report
28 days
Average time to resolve a critical vulnerability through a mature bug bounty
$1,685
Average critical bug bounty payout in 2024
65%
Of organizations with a VDP receive at least one valid report in the first 90 days

Every organization with an internet-facing attack surface has security researchers probing it — some malicious, some looking for legitimate disclosure channels. A vulnerability disclosure program (VDP) gives researchers a clear path to report what they find to you rather than to anyone else.

CISA Binding Operational Directive 20-01 required all U.S. federal agencies to have a VDP published by March 2021. The private sector has no equivalent mandate, but the reputational and legal risk of prosecuting or ignoring a good-faith researcher who reported a genuine vulnerability is substantial.

This guide covers the spectrum from a basic coordinated disclosure policy to a full managed bug bounty program — the policy structure, safe harbor language, triage process, researcher communication, and platform options that make a VDP operational rather than a checkbox.

VDP vs. Bug Bounty: Choosing the Right Starting Point

A vulnerability disclosure program (VDP) and a bug bounty are related but different commitments. A VDP is a policy document with a communication channel — it tells researchers how to report vulnerabilities and commits the organization to a good-faith response. There are no financial rewards. A bug bounty adds monetary incentives tied to vulnerability severity and scope, typically managed through a platform that also handles researcher vetting, triage, and payment.

For organizations with no existing external security research engagement, start with a VDP before a bug bounty. A VDP surfaces your vulnerability intake process gaps, tests your triage and remediation workflow, and establishes researcher relationships before you are paying for reports. Many organizations discover they receive more reports than their security team can triage within expected SLAs before they are ready for a live bounty program — this is better discovered through a VDP than through a paid program with SLA obligations to researchers.

Bug bounties are appropriate for organizations that have: a defined scope of applications and infrastructure they are comfortable having researchers probe, a triage team (internal or through a platform) able to review and prioritize reports within 72 hours for critical findings, a remediation workflow that can close critical vulnerabilities within 30 days, and budget for researcher rewards at market rates (typically $500-$2,500 for high severity, $5,000-$25,000 for critical/RCE on in-scope assets).

Private bug bounties — invite-only programs available through HackerOne and Bugcrowd — are an intermediate step between a VDP and a public program. They engage a vetted pool of researchers against your scope without the unlimited public inbound volume of a public program.

Writing a Policy That Researchers Will Trust

The most critical element of any VDP is safe harbor language — explicit legal protection for researchers acting in good faith within the program scope. Without safe harbor, researchers cannot be confident that reporting a vulnerability will not result in prosecution under the Computer Fraud and Abuse Act (CFAA) or equivalent statutes in other jurisdictions.

Minimum safe harbor language must include: authorization to access the specified in-scope systems for security testing purposes, commitment not to pursue civil or criminal action against researchers following the program rules, commitment to respond to reports within a defined SLA (72 hours acknowledgment, 14 days initial assessment), and coordination procedure for public disclosure after remediation (standard is 90 days from report, aligned with Google Project Zero).

Scope definition determines what researchers are authorized to test. In-scope: your primary web applications and APIs, mobile apps, and public-facing authentication systems. Out-of-scope: denial-of-service attacks, phishing your own employees, accessing customer data beyond proof-of-vulnerability, physical security testing, and third-party services. Explicit out-of-scope lists prevent researchers from doing things that would create legal liability or operational damage.

Do not use vague language about 'minimal impact' or 'responsible testing' as a substitute for explicit scope — researchers operate under a reasonable interpretation of scope boundaries, and ambiguity leads to disputes. If you do not want researchers testing your production database, say so explicitly, and tell them what testing environment is available instead.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Platform Selection: Self-Hosted vs. Managed

VDP and bug bounty programs can be self-hosted (a security.txt file, a security@ email address, and a ticketing system) or managed through a platform (HackerOne, Bugcrowd, Intigriti, Synack).

Self-hosted VDPs are appropriate for organizations with a small in-scope attack surface and adequate internal security team capacity to triage reports. Required components: a security.txt file at /.well-known/security.txt with your policy URL and contact, a published policy page, a dedicated email address or web form with acknowledgment receipts, and a ticketing system integration for triage. This costs essentially nothing and satisfies CISA BOD 20-01 requirements.

Managed platforms provide: researcher vetting and fraud prevention, triage-as-a-service (Bugcrowd and HackerOne both offer platform-level triage that filters duplicates and assesses validity before reports reach your team), researcher reputation systems that improve report quality, payment processing for bounties, and program analytics. HackerOne and Bugcrowd are the two largest platforms, with the largest vetted researcher communities.

Intigriti is the leading European platform, important for GDPR-compliant programs where researcher data residency matters. Synack offers the most restrictive researcher vetting model (employed researchers, background-checked) appropriate for financial services, healthcare, and government programs where regulatory scrutiny of who has access to systems is significant.

For budget-constrained teams, a self-hosted VDP with a security.txt file and security@ email is a completely viable starting point. Migrate to a managed platform when report volume exceeds what the internal team can triage or when you are ready to launch a paid bounty.

Triage, Remediation, and Researcher Communication

The most common failure mode for new VDPs is poor researcher communication — reports acknowledged but never resolved, remediation taking months without updates, duplicate reports handled dismissively. Researchers talk to each other. A program with poor communication gets a bad reputation in the research community and stops receiving reports.

Triage SLAs for viable programs: acknowledge receipt within 24-72 hours, provide initial validity assessment within 14 days, provide remediation timeline within 30 days of valid report. For critical findings (RCE, authentication bypass, mass account takeover), all three happen within 72 hours.

Duplicate handling is a common point of friction. When a report duplicates an already-known vulnerability, tell the researcher whether the issue is already known internally and under active remediation or whether it was unknown before their report. Researchers receiving 'duplicate — not eligible for reward' with no context feel exploited. If their report identified an issue you were already working on, tell them that — researchers generally accept this with a courtesy acknowledgment.

Coordinated disclosure timing: standard industry practice is 90 days from report to public disclosure, regardless of whether the organization has remediated. This creates deadline pressure on remediation teams. If you need more than 90 days, communicate with the researcher early and negotiate an extension — researchers will usually grant 30-day extensions for complex vulnerabilities when asked respectfully and given evidence of active remediation work.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

The bottom line

A vulnerability disclosure program is table stakes for any organization with a public attack surface — it is not a luxury or a statement about maturity. Start with a security.txt file, a security@ email, a one-page policy with safe harbor language, and a clear scope definition. This takes a day to stand up and is immediately meaningful. Add a managed platform and financial rewards when your team has the triage capacity and remediation velocity to honor them. Researchers who trust your program will bring you vulnerabilities before attackers exploit them.

Frequently asked questions

Is a bug bounty the same as a penetration test?

No. A penetration test is a contracted, time-boxed, scoped security assessment conducted by a specific firm with explicit authorization. You know who is testing, when they are testing, and what they will assess. A bug bounty is an open invitation to an unspecified community of researchers to test your systems within defined scope continuously. Bug bounties find vulnerabilities that periodic penetration tests miss between assessments; penetration tests provide depth and methodology that bug bounty programs do not. Both are complementary parts of a mature application security program.

What is security.txt?

Security.txt (RFC 9116) is a standardized file format placed at /.well-known/security.txt that tells security researchers how to contact your organization about vulnerabilities. It contains: the contact address for vulnerability reports, a link to your security policy, an optional encryption key for confidential disclosure, and an expiration date. It takes minutes to create and is how Google, automated scanners, and many researchers look for disclosure channels before trying to contact organizations through other means. Not having a security.txt file means researchers cannot find your disclosure channel and may give up or go elsewhere.

What should I pay for bug bounty reports?

Bug bounty payout norms in 2025: informational/low severity (no payment or $50-200 acknowledgment), medium severity (SQL injection limited to own data, reflected XSS) $200-500, high severity (stored XSS, IDOR affecting other users, SSRF) $500-2,500, critical severity (RCE, authentication bypass, mass account takeover, sensitive data exposure) $2,500-25,000+. For critical assets (financial services, healthcare, critical infrastructure), top-tier payouts are $50,000-100,000 for RCE or full compromise. HackerOne publishes annual payout benchmarks — calibrate to your industry and asset criticality.

What is coordinated disclosure vs. full disclosure?

Coordinated disclosure (also called responsible disclosure) is the standard practice where a researcher reports a vulnerability to the vendor or organization privately and agrees to hold public publication for a period (typically 90 days) to allow for remediation. Full disclosure is immediate public release of vulnerability details without private notification. Google Project Zero popularized the 90-day coordinated disclosure window with public release regardless of whether the vendor has patched. Full disclosure without coordination is generally considered irresponsible unless the vendor has been unresponsive or hostile to previous disclosure attempts.

Sources & references

  1. CISA Binding Operational Directive 20-01 — Vulnerability Disclosure Policy
  2. ISO/IEC 29147:2018 — Vulnerability Disclosure
  3. NIST SP 800-216 — Recommendations for Federal Vulnerability Disclosure Guidelines

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.