Bug Bounty Overview

What is Bug Bounty?

Aikido Bug Bounty is a feature that lets you create programs to submit vulnerability reports and automatically analyze them using AI pentest agents. Your team or or an integration submit reports describing potential vulnerabilities, and Aikido's agents validate each one, producing confirmed findings with severity, proof-of-concept data, and remediation guidance.

Bug Bounty is built on the same engine that powers Pentests. While a regular pentest proactively scans your application for vulnerabilities, Bug Bounty is purpose-built for processing researcher-submitted reports. Every submitted report triggers an automated AI analysis that produces validated findings.

Submitting reports

There are two ways to submit vulnerability reports to a Bug Bounty program:

Via the Aikido UI

Navigate to your program and submit a report directly from the dashboard. See Submitting a report via the UI for details.

Via the Public REST API

Submit reports programmatically, enabling integration with external bug bounty platforms or custom researcher portals. See Submit via API for details.

What happens after submission

Every submitted report triggers an automated AI analysis. Aikido's agents use the report description (and any attached files) as context to investigate the reported vulnerability against your pre-configured scope. The result is a set of validated findings, each with severity, attack type, CWE references, example request/response data, and remediation steps.

You can monitor the analysis in real time from the assessment detail page. See Reviewing the Results for a full walkthrough.

Last updated

Was this helpful?