Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)
Switch branches/tags
Nothing to show
Clone or download
Latest commit bc77c86 Jun 14, 2018

bountyplz – automated security reporting from markdown templates


This is a project created by Frans Rosén. The idea is to be able to submit a report without any interaction. It's taking advantage of all features the existing site has, such as attachments, inline images, assets, weaknesses and severity.

bountyplz supports submitting to HackerOne and Bugcrowd.

bountyplz will sign in to HackerOne or Bugcrowd and keep the session, create a draft and submit the report, all in one step. It also supports 2FA, if this is enabled on your HackerOne- or Bugcrowd-account.




brew install jq
brew install gnu-sed

ln -fs "$(pwd)/bountyplz" /usr/local/bin/bountyplz

usage HackerOne h1

Place .env with HACKERONE_USERNAME and HACKERONE_PASSWORD next to the binary.

bountyplz h1 <program> <markdown-file>

-p for preview
-d for draft-only
-f for force

usage Bugcrowd bc

Place .env with BUGCROWD_USERNAME and BUGCROWD_PASSWORD next to the binary.

bountyplz bc <program> <markdown-file>

-p for preview
-d for draft-only (will upload files but not save any draft as this is currently not supported on Bugcrowd)
-f for force


Write report in markdown, use frontmatter for attributes for the report. The title of the report will be taken from the content's first #-header.

severity: high
weakness: xss reflected

# Report title

Report description

The following attributes are currently supported:

key type desc
asset string will be matched against the list of assets for the program
weakness string will be matched against the list of weaknesses for the program.
attachments json-array list of files that should be attached. ["test.jpg","test2.jpg"]
if images and videos are used inline, these does not need to be in this list
url string bug URL (BugCrowd only, not required)
severity string none, low, medium, high, crical (HackerOne only)

When the report is submitted, an additional report-attribute will be added to the markdown with the reference URL for the report. This is to make sure the same report is not submitted twice.

asset and weakness will try to match against the list of available options. If multiple results are found, a list will be shown to select the right one:


For HackerOne, if any header with the word impact exist in the report, the report will be split in half and the content after Impact will be inserted in the Impact-field. If no Impact exists in the report, the Impact field will only contain a # rendering it empty.


# Report title

Report description

### impact

This will be in the impact field.

For Bugcrowd, the whole report will be inside the Description-field.

inline attachments

When referring to images or videos inside the report, use this format: <img upload src="x.jpg" />

Every image or video element containing <img|video upload will be extracted from the report and uploaded automatically. The location of the file referenced will always be relative to the markdown-file, and the preview before submitting will make sure all files exists.

preview -p

You can preview the report before sending it using:

bountyplz h1 yahoo -p test/

This will not submit the report, but show you how the report was parsed.

draft-only -d

You can submit the report as a draft only using:

bountyplz h1 yahoo -d test/

Please note that Asset and Severity are not currently possible to save in the draft on HackerOne.

force -f

Whenever a file has been reported, the markdown-file is being modified to add a reference to the report-URL inside the frontmatter called report: URL. This is to prevent the report from being submitted again. By using -f you can force the report to be submitted, even if it has a report:-entry in the frontmatter. Use with caution to prevent duplicate reports.


This command will run all markdown files and report them. If a report already has a "report: "-reference in it, the report will not be sent.

find . -name "*.md" \( -exec bountyplz h1 <program> {} \; -o -quit \)