Skip to content

HackerOne

Ingest bug bounty reports from HackerOne.

1 min read · For: Security Engineers · Updated Mar 22, 2026 · Edit

Imports bug bounty vulnerability reports from HackerOne into Basirah as findings.

Prerequisites

  • HackerOne program with API access
  • API credentials (username and API token)

Authentication

Basic authentication (username/API token).

Configuration

No additional configuration fields required. Provide credentials during setup.

Data flow

Ingests bug bounty reports from HackerOne and normalizes them into Basirah’s common finding format.