Closed afeld closed 4 years ago
Got some really great examples from HackerOne
Some questions that came up in an email that may be useful to speak to, to the extent we can:
- pricing set up
- how did you reach out to the additional companies
- share some lessons learned
- [Firm-Fixed Price] was it the best?
- evaluation how did the oral evaluations went?
- how did you plan around the security concerns?
Got the draft to 66% -- moving to Waiting/Blocked until can get some feedback; will mention at the Review tomorrow and give folks a 2 weeks to provide input.
@afeld I feel like we're at the point where I should pick this up next or we should make the hard decision that we're not going to go through with it
Starting the time-boxed enhancement of this document now -- moving into In-Progress
and will move to 'Waiting/Blocked' once I finish and mark Feedback Needed for a peer review to determine if we should go forward or kill it
Left some comments! I do still think it would be useful to speak to the pricing structure a bit, since that's a question that seems to come up a lot.
Ok, I changed the title of this issue to 'Write Blog Post' -- The blog post is now written; so going to open a new issue to get the Blog Post published as a way to break this task down to a smaller components
https://docs.google.com/document/d/1v7xkzG03-r98jyXlnyxJfY7s6qbZjCvorScNjwHCxfg/edit
Background information
We put together a number of talking points about the Bug Bounty for the CISO Exchange meeting on 1/16. Given that there is probably broader interest, would be worth the bit of extra effort to turn that into a blog post.
User stories
Implementation
Acceptance criteria