Table of Contents

Ch 2: Sustaining Your Success

Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)

Writing Good Reports

A report is how you get paid and build reputation. Bad writing = low payouts + duplicates marked invalid.

8-step report structure:

  1. Title – one sentence: vuln type + location + impact. Example: “Stored XSS in /profile/bio allows attacker to steal session cookies”
  2. Summary – 2-3 sentences. What is the bug, where is it, what can an attacker do?
  3. Severity – CVSS score + label (Critical/High/Medium/Low). Justify your rating.
  4. Steps to reproduce – numbered, exact, no assumptions. Another person must be able to reproduce with zero context.
  5. Proof of concept – screenshots, HTTP requests/responses, video. Show it working.
  6. Impact – explain real-world consequences. Who is affected? What data is exposed? What actions can be taken?
  7. Mitigations – suggest a fix. Not required but earns goodwill.
  8. Validate – test your own PoC before submitting. If it doesn't reproduce 100%, find out why first.

Report States

After submission you'll see one of these:

Handling Duplicates and N/As

Building Relationships

Why You're Failing

Common reasons beginners don't find bugs:

What to Do When Stuck

Severity Quick Reference

Severity Examples
Critical Account takeover, RCE, mass data exposure
High Privilege escalation, significant data leak, auth bypass
Medium CSRF, stored XSS (limited scope), IDOR (limited data)
Low Reflected XSS, open redirect, minor info disclosure
Informative Missing security headers, self-XSS