Where do we stand?

Last updated on 27.04.2024

Our next goal is to validate our platform and our idea ourselves and find out whether there is a need for Hacky. We have created a prototype for this. Together with a few selected companies, we can use this to test our concept and identify and solve major problems.

Once we know that Hacky really solves our customers’ problems, we will expand the platform and open it up to all companies. We assume that this will be the case in late summer.

Also interesting

Do I need a test environment?

No. The conditions for the hackers should be as real as possible. Normally your productive system/network is tested directly. This allows you to find gaps that may be closed on the test server but still exist in production or in components that only exist there.
Aktualisiert: 27.04.2024

What are the hackers allowed to do?

On our platform, you – and of course our hackers – will find a precise list of what is permitted and what is prohibited. You can include or exclude further points. We are also happy to assist you if you have any questions. However, if you are unsure, we recommend that you simply use the Hacky template, as it includes and excludes everything relevant and will certainly be ideal for you to start with.
Aktualisiert: 27.04.2024

What do all these terms mean?

We always try to communicate as clearly and simply as possible. It may happen that we use a term that you are not familiar with. We would therefore like to discuss how we define and interpret certain terms.
Hacker, Expert, White Hat, Ethical Hacker
A person who has excellent knowledge of computer security and specializes in finding vulnerabilities in networks, software and systems. We always act ethically and never exploit these vulnerabilities, but report them immediately to the individuals and companies concerned.
Bug Bounty
If a reward is paid to the finder for reporting a vulnerability or bug.
Bug, Vulnerability, Vulnerability, Gap
When a system or software does not behave as expected. This behavior of the software could then potentially alienate purpose.
(Hacker) Community
All hackers who search for possible vulnerabilities in the listed infrastructures on our platform and report them to us.
bounty, reward
If a hacker reports a valid vulnerability, they will receive a reward for it.
Scope
Defines the area or the systems that may be tested for bugs/vulnerabilities and the methods with which these tests are permitted.  
Aktualisiert: 27.04.2024