Bug Bounty Overview
What is Bug Bounty?
Aikido Bug Bounty is a feature that lets you create programs to submit vulnerability reports and automatically analyze them using AI pentest agents. Your team or or an integration submit reports describing potential vulnerabilities, and Aikido's agents validate each one, producing confirmed findings with severity, proof-of-concept data, and remediation guidance.
Bug Bounty is built on the same engine that powers Pentests. While a regular pentest proactively scans your application for vulnerabilities, Bug Bounty is purpose-built for processing researcher-submitted reports. Every submitted report triggers an automated AI analysis that produces validated findings.
Submitting reports
There are two ways to submit vulnerability reports to a Bug Bounty program:
Via the Aikido UI
Navigate to your program and submit a report directly from the dashboard. See Submitting a report via the UI for details.
Via the Public REST API
Submit reports programmatically, enabling integration with external bug bounty platforms or custom researcher portals. See Submit via API for details.
What happens after submission
Every submitted report triggers an automated AI analysis. Aikido's agents use the report description (and any attached files) as context to investigate the reported vulnerability against your pre-configured scope. The result is a set of validated findings, each with severity, attack type, CWE references, example request/response data, and remediation steps.
You can monitor the analysis in real time from the assessment detail page. See Reviewing the Results for a full walkthrough.
Last updated
Was this helpful?