HackerOne
Ingest bug bounty reports from HackerOne.
Imports bug bounty vulnerability reports from HackerOne into Basirah as findings.
Prerequisites
- HackerOne program with API access
- API credentials (username and API token)
Authentication
Basic authentication (username/API token).
Configuration
No additional configuration fields required. Provide credentials during setup.
Data flow
Ingests bug bounty reports from HackerOne and normalizes them into Basirah’s common finding format.