layout | title |
---|---|
page |
Example HackerOne Threat Model |
Access levels:
- Unauthenticated
Entrypoints [non-static]:
- Hacktivity: https://hackerone.com/hacktivity
- Report: https://hackerone.com/reports/228648
- Program policy: https://hackerone.com/security
- Program hacktivity: https://hackerone.com/security/hacktivity
- Program thanks: https://hackerone.com/security/thanks
- Program updates: https://hackerone.com/security/updates
- HackerOne Response contact: https://www.hackerone.com/product/response#contact
- HackerOne Challenge contact: https://www.hackerone.com/product/challenge#contact
- HackerOne Bounty contact: https://www.hackerone.com/product/bounty#contact
- HackerOne Clear contact: https://www.hackerone.com/product/clear#contact
- Sales contact: https://www.hackerone.com/contact
- Leaderboard: https://hackerone.com/leaderboard/all-time
- Program Directory: https://hackerone.com/directory/programs
- Blog: https://www.hackerone.com/blog
- User signup: https://hackerone.com/users/sign_up
- Forgot password: https://hackerone.com/users/password/new
- Press: https://www.hackerone.com/press
Target assets:
- User credentials and PII
- Private program names
- Confidential bug reports
- Database credentials
Top priority:
- Hacktivity (global and program), Program Directory
- Sign-in
- Sign-up forms
- Forgot password
- Contact forms