{"id":254,"date":"2013-11-07T09:09:17","date_gmt":"2013-11-07T09:09:17","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=254"},"modified":"2022-12-02T17:10:55","modified_gmt":"2022-12-02T11:40:55","slug":"bug-bounty-an-introduction","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/","title":{"rendered":"Bug Bounty : An Introduction"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2013\/11\/bug-bounty-1024x682.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"bugbounty - Varutra Consulting\"><\/p>\n<h3><strong>What exactly is Bug Bounty ?<\/strong><\/h3>\n<p style=\"text-align: justify\">In the Wild West, when outlaws roamed the land, local sheriffs did not have the resources to track them down alone. So they put up &#8220;Wanted&#8221; posters, offering huge rewards (a fairly handsome amount) for their capture.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug_bounty.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-255 alignleft\" style=\"margin: 5px\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug_bounty-233x300.jpg\" alt=\"bug_bounty\" width=\"233\" height=\"300\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2013\/11\/bug_bounty-233x300.jpg 233w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2013\/11\/bug_bounty.jpg 462w\" sizes=\"(max-width: 233px) 100vw, 233px\" \/><\/a><\/p>\n<p style=\"text-align: justify\">Thus began the concept of &#8220;bounty hunting&#8221;. A bounty hunter captures fugitives for a monetary reward a.k.a. bounty. Other names, mainly used in the United States, include bail enforcement agent and fugitive recovery agent.<\/p>\n<p>From capturing notorious criminal, Bounty Hunting has since been introduced into Information Technology as well.<\/p>\n<p style=\"text-align: justify\">Software companies pay a certain amount (Bounty) to the security researcher (Bounty Hunter) who finds critical &#8220;bugs&#8221; or vulnerabilities in their software. This is known as \u201cBug Bounty\u201d.<\/p>\n<p style=\"text-align: justify\">This concept was first conceived by Netscape in 1995. Few companies to follow were iDefense (2002), Mozilla Firefox (2004), ZDI (2005), Pwn2Own(2007), Google Chromium(2010) and Facebook(2011).<\/p>\n<p style=\"text-align: justify\">This is a very lucrative field for Information Security enthusiasts and researchers as well. When a security researcher reports a valid vulnerability in an application, then the developing organization pays a bounty to the researcher, instead of just saying a simple thank you.<\/p>\n<p style=\"text-align: justify\">Bug bounty provides a platform to the researchers to improve their skills and experience and to get rewarded with a bounty. Not only do you get rewarded for finding vulnerabilities, but you may also get your name listed in the company&#8217;s Hall of Fame. Doesn\u2019t that sound great?<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Why do companies organize bug bounty programs?<\/strong><\/h3>\n<p style=\"text-align: justify\">The answer is simple, to be secure. By providing this policy, many security researchers around the world will try to find vulnerabilities in the target applications. Every security researcher has his\/her own methodology to find the bugs. This yields to broader coverage of scrutiny on the application from a security standpoint. One more important thing is that these bug bounties encourage young and talented security researchers to showcase their talent, implement on real word applications and learn immensely in the process.<\/p>\n<p>Few companies which provide bug bounty are:<\/p>\n<ul>\n<li>Google<\/li>\n<li>Microsoft<\/li>\n<li>Facebook<\/li>\n<li>PayPal<\/li>\n<li>Mozilla, and many more.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>So, what types of vulnerabilities are accepted?<\/strong><\/h3>\n<p style=\"text-align: justify\">It all depends on the impact of the vulnerability on the application. From my experience, major vulnerabilities that the companies look for to be identified, when offering a bug bounties are:<\/p>\n<p>1. Remote Code Execution<\/p>\n<p>2. SQLi<\/p>\n<p>3. Authentication Bypass<\/p>\n<p>4. Privilage Escalation<\/p>\n<p>5. XSS (All flavours)<\/p>\n<p>6. CSRF<\/p>\n<p>7. Clickjacking<\/p>\n<p>8. Unvalidated Redirects and Forwards<\/p>\n<p style=\"text-align: justify\">This does not mean that only these vulnerabilities are accepted. Companies provide bounty only for reporting a previously unknown security vulnerability of sufficient severity.\u00a0 Based on the severity, a higher amount is paid. It may be considered a good part time work for security researchers as they get exposed to real world applications, and get paid in the process.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Why are these programs successful?<\/strong><\/h3>\n<p style=\"text-align: justify\">This is mainly because of the participation of the both white hat (ethical hacker) and black hat (unethical hacker) community. Mostly white hat hackers participate in these programs to learn and get paid. The strategy of black hat hackers is also the same, but they more concentrate on the bounty part. If a black hat hacker finds vulnerability, then he has a chance to either responsibly report to the organization or to sell it in the black market. So it is important for companies and organizations to track the activities of these \u201cbounty hunters\u201d and lay down strict policies against finding and reporting vulnerabilities.<\/p>\n<p style=\"text-align: justify\">One more lucrative attraction is that once vulnerability is reported, the name of finder makes to the company\u2019s hall of fame, which increases his\/her reputation in the community.<\/p>\n<p>So, join the hunt, let your names to be listed in Halls of Fame and your pockets be filled \ud83d\ude42<\/p>\n<p>Written By,<\/p>\n<p><em>Attack &amp; PenTest Team,<\/em><\/p>\n<p><em>Varutra Consulting<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>What exactly is Bug Bounty ? In the Wild West, when outlaws roamed the land, local sheriffs did not have the resources to track them&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3207,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[268,140,261],"tags":[],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Do you want to get rewarded as well as get your name listed in the company&#039;s hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Bug Bounty : An Introduction | Varutra Consulting\" \/>\n\t\t<meta property=\"og:description\" content=\"Do you want to get rewarded as well as get your name listed in the company&#039;s hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug-bounty.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug-bounty.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t\t<meta property=\"article:section\" content=\"Bug Bounty\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2013-11-07T09:09:17+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T11:40:55+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Bug Bounty : An Introduction | Varutra Consulting\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Do you want to get rewarded as well as get your name listed in the company&#039;s hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug-bounty.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#article\",\"name\":\"Bug Bounty : An Introduction | Varutra Consulting\",\"headline\":\"Bug Bounty : An Introduction\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2013\\\/11\\\/bug-bounty.png\",\"width\":1280,\"height\":853,\"caption\":\"bug-bonty\"},\"datePublished\":\"2013-11-07T09:09:17+05:30\",\"dateModified\":\"2022-12-02T17:10:55+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#webpage\"},\"articleSection\":\"Bug Bounty, Case Study, Ethical Hacking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#listItem\",\"position\":2,\"name\":\"Bug Bounty : An Introduction\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/\",\"name\":\"Bug Bounty : An Introduction | Varutra Consulting\",\"description\":\"Do you want to get rewarded as well as get your name listed in the company's hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2013\\\/11\\\/bug-bounty.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#mainImage\",\"width\":1280,\"height\":853,\"caption\":\"bug-bonty\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/bug-bounty-an-introduction\\\/#mainImage\"},\"datePublished\":\"2013-11-07T09:09:17+05:30\",\"dateModified\":\"2022-12-02T17:10:55+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Bug Bounty : An Introduction | Varutra Consulting<\/title>\n\n","aioseo_head_json":{"title":"Bug Bounty : An Introduction | Varutra Consulting","description":"Do you want to get rewarded as well as get your name listed in the company's hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Bug Bounty : An Introduction | Varutra Consulting","og:description":"Do you want to get rewarded as well as get your name listed in the company's hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug-bounty.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug-bounty.png","og:image:width":"1280","og:image:height":"853","article:section":"Bug Bounty","article:published_time":"2013-11-07T09:09:17+00:00","article:modified_time":"2022-12-02T11:40:55+00:00","twitter:card":"summary_large_image","twitter:title":"Bug Bounty : An Introduction | Varutra Consulting","twitter:description":"Do you want to get rewarded as well as get your name listed in the company's hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug-bounty.png","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"3 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#article","name":"Bug Bounty : An Introduction | Varutra Consulting","headline":"Bug Bounty : An Introduction","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2013\/11\/bug-bounty.png","width":1280,"height":853,"caption":"bug-bonty"},"datePublished":"2013-11-07T09:09:17+05:30","dateModified":"2022-12-02T17:10:55+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#webpage"},"articleSection":"Bug Bounty, Case Study, Ethical Hacking"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#listItem","position":2,"name":"Bug Bounty : An Introduction","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/","name":"Bug Bounty : An Introduction | Varutra Consulting","description":"Do you want to get rewarded as well as get your name listed in the company's hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2013\/11\/bug-bounty.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#mainImage","width":1280,"height":853,"caption":"bug-bonty"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/#mainImage"},"datePublished":"2013-11-07T09:09:17+05:30","dateModified":"2022-12-02T17:10:55+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"254","title":"Bug Bounty : An Introduction | Varutra Consulting","description":"Do you want to get rewarded as well as get your name listed in the company's hall of fame for finding vulnerabilities? Read our wonderful blog on bug bounty.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Bug Bounty\",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/bug-bounty.png","og_image_width":"1280","og_image_height":"853","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Bug Bounty","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:18:10","updated":"2022-12-02 11:50:23"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/bug-bounty\/\" title=\"Bug Bounty\">Bug Bounty<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tBug Bounty : An Introduction\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Bug Bounty","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/bug-bounty\/"},{"label":"Bug Bounty : An Introduction","link":"https:\/\/www.varutra.com\/varutravrt3\/bug-bounty-an-introduction\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/254"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":4,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/254\/revisions"}],"predecessor-version":[{"id":20384,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/254\/revisions\/20384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3207"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}