What are the hackers allowed to do?

Last updated on 27.04.2024

On our platform, you – and of course our hackers – will find a precise list of what is permitted and what is prohibited. You can include or exclude further points. We are also happy to assist you if you have any questions. However, if you are unsure, we recommend that you simply use the Hacky template, as it includes and excludes everything relevant and will certainly be ideal for you to start with.

Also interesting

Do I need a test environment?

No. The conditions for the hackers should be as real as possible. Normally your productive system/network is tested directly. This allows you to find gaps that may be closed on the test server but still exist in production or in components that only exist there.
Aktualisiert: 27.04.2024

What do all these terms mean?

We always try to communicate as clearly and simply as possible. It may happen that we use a term that you are not familiar with. We would therefore like to discuss how we define and interpret certain terms.
Hacker, Expert, White Hat, Ethical Hacker
A person who has excellent knowledge of computer security and specializes in finding vulnerabilities in networks, software and systems. We always act ethically and never exploit these vulnerabilities, but report them immediately to the individuals and companies concerned.
Bug Bounty
If a reward is paid to the finder for reporting a vulnerability or bug.
Bug, Vulnerability, Vulnerability, Gap
When a system or software does not behave as expected. This behavior of the software could then potentially alienate purpose.
(Hacker) Community
All hackers who search for possible vulnerabilities in the listed infrastructures on our platform and report them to us.
bounty, reward
If a hacker reports a valid vulnerability, they will receive a reward for it.
Scope
Defines the area or the systems that may be tested for bugs/vulnerabilities and the methods with which these tests are permitted.  
Aktualisiert: 27.04.2024

Is Hacky liable for the community?

Safety is our top priority, that is clear. All registered experts are clearly made aware of our guidelines and confirm that they will adhere to them. Since our community consists of independent hackers who search for security vulnerabilities on their own, we cannot be held liable for their actions. Of course, we do not tolerate any misuse of our program, platform or offer. If our guidelines are seriously violated, the persons concerned will be blocked from our platform for an indefinite period of time.
Aktualisiert: 27.04.2024