TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Launch HN: Federacy (YC S18) – bug bounties for startups

71 pointsby jsulinskialmost 7 years ago
Hey all, we&#x27;re James and William, founders of Federacy (YC S18). We&#x27;re building a bug bounty platform for startups. (<a href="https:&#x2F;&#x2F;www.federacy.com" rel="nofollow">https:&#x2F;&#x2F;www.federacy.com</a>)<p>I was an early engineer at MoPub, responsible for security and infrastructure. By the time we were acquired by Twitter, we were 20+ engineers, but growing so fast that building software and systems securely was almost an impossible task. I found that there were never enough hands; I couldn’t peel engineers from revenue-driving features and it was really difficult to find contract or full-time security engineers.<p>William and I started Federacy to make it easier for startups to secure themselves. We think the key is to pair startups with extremely talented, outside security researchers to test their applications for vulnerabilities, review code, and help implement best practices—essentially serving as an outsourced CISO.<p>We saw that the best security minds we knew either weren&#x27;t interested in a full-time role for a single company, weren’t able to work in the United States, or already had day jobs at the largest Internet companies. We thought that if we provided an efficient, no-bullshit way for them to do work that they enjoy, make a real difference in how startups secure themselves, and make money while honing their skills, we could unlock a huge amount of talent that wasn’t accessible previously.<p>We have a lot of respect for what HackerOne and BugCrowd have built, but they are focused on serving mostly enterprise companies with large engineering and security teams, who can afford their services. Their revenue comes largely from triaging the high volume of low-quality and automated&#x2F;spam bug reports that come through their platforms. These services can be in the six figure range. It may be a good business, but that isn’t where our passion lies.<p>Startups can’t afford these services and the burden of triaging low-quality bug reports can completely overwhelm even the best dev teams, leaving them worse off than they started.<p>We think there is a better way:<p>• We hand-pair startups with a small team of pre-vetted researchers who are subject matter experts in your stack.<p>• Researchers test your infrastructure for vulnerabilities in an initial scan, and work closely with you to resolve issues and implement best practices.<p>• Your program can be private, where only you and the researchers you approve will have access to your program. You don’t have to provide source code and all initial testing is done with only the information and access your normal users have.<p>• We create your program for you and have you up and running in 5 minutes (or you can self-serve, if you prefer).<p>• We only charge for results (when a researcher finds a vulnerability).<p>We just started building a couple months ago and are looking for early feedback. Here’s an invite link we made for HN:<p><a href="https:&#x2F;&#x2F;www.federacy.com&#x2F;signup?invitation_id=3b4d06c5-ac02-4b9b-b0b9-4bf1e72f7f7f" rel="nofollow">https:&#x2F;&#x2F;www.federacy.com&#x2F;signup?invitation_id=3b4d06c5-ac02-...</a><p>We’ll be around all day to chat and are very happy to answer any questions as well as discuss how we built our product, security-related topics (systems automation, vulnerability reporting, coping with imposter syndrome, etc.), what it&#x27;s like building a startup with family (we’re twin brothers), or anything in between.<p>Some specific questions we have:<p>If you’re familiar with other bug bounty platforms, are there any issues we can tackle early on that made the experience frustrating for you?<p>Would you consider contracting an outsourced CISO or a pentest with a security researcher that has reported vulnerabilities to you through your bug bounty program?

5 comments

fridaymorning81almost 7 years ago
We&#x27;ve used HackerOne at a startup I work at (10-20 employees). We had to turn it off because we were getting bombarded every couple days with the same issues, that were just run by crackers&#x2F;hackers running basic pen test scripts. They all seemed to have the same toolkit, and would just run the same tests and report the same bugs. Most of which were either invalid, or just not a priority and, so, a waste of our time to read. The write-up of the bug was also poor, with poor English, and this causes wasted time..<p>Before signing up for another bug bounty program I&#x27;d want to know that:<p>1) The testers were not mostly just amateur crackers running the same toolkit on 100 sites per day, and the same toolkit that 10 testers ran yesterday.<p>2) The amount of dupe reports was basically 0.. If we get a bug reported and we ignore it, and make zero response, we still do not want to get the same report 10 times over the next 2 months.<p>3) The write-ups should have proper English, good grammar, and be very clear.<p>4) If a user reports 10 bugs, and we only want to pay for 1, that should be totally fine. The other 9 are either dupes that we have ignored before, or new reports that are just not a priority or worth looking at.<p>5) We basically never want to get into a negotiation with the hackers over if a payout should be $2000 because 10 bugs were reported when we know of all the bugs and, basically, don&#x27;t value them.
评论 #17674084 未加载
评论 #17674008 未加载
etermalmost 7 years ago
As a &quot;researcher&quot; I don&#x27;t find your vulnerability levels too informative. I&#x27;d suggest you use or adapt the bugcrowd taxonomy: <a href="https:&#x2F;&#x2F;bugcrowd.com&#x2F;vulnerability-rating-taxonomy" rel="nofollow">https:&#x2F;&#x2F;bugcrowd.com&#x2F;vulnerability-rating-taxonomy</a><p>That is a model that has been shaped from the experience of many programs and has a clear, &quot;yes this is an issue but no you&#x27;re not getting paid&quot; level which is important for avoiding thousands of time-wasting reports such as non-perfect HTTPS headers, etc.<p>I&#x27;d be interested in hearing how you plan to deal with duplcate reports. This is an area that hackerone does better than bugcrowd. Hackerone is more interested in disclosure and getting reports to a point where they can be disclosed. If a bug is marked duplicate you are given access to the original report which prevents falsely marking duplicates to avoid bounties.
评论 #17675161 未加载
tptacekalmost 7 years ago
What does it mean to &quot;contract an outsourced CISO&quot; to a researcher who reported through a bug bounty program? What&#x27;s an &quot;outsourced CISO&quot;?<p>I think it&#x27;s unlikely that &quot;CISO&quot; is the word you want to use in your copy.<p>How are you vetting researchers? I logged in as a researcher, and it looks like it works just like H1 works: there are public bounties, and private ones for which admission is gated by performance on the public bounties.<p>It is not the case that H1 typically costs six figures; typical costs for a startup on H1, with triage, are low five figures.<p>We manage bug bounties for several of our clients (we run outsourced security teams for startups). If there&#x27;s a problem we have with bounties, it&#x27;s <i>not getting enough</i> submissions from them. Triage can be annoying (I kind of enjoy it), but we do full-scope penetration tests for each of our clients, and it&#x27;s noteworthy how much more a real pentest finds than a bounty program. There are different incentives, different information available, and different kinds of work result.<p>(There are things bounties do better, too; bounties are good for finding oddball XSS and CSRF problems, and good at corner-case web hygiene stuff).<p>How are you attracting talent? I don&#x27;t really understand the business model. Bounty researchers already have a bunch of platforms they can use if they want to do bounty-type scanning. Why are they using yours?
评论 #17676862 未加载
ahartman00almost 7 years ago
&quot;Would you consider contracting an outsourced CISO or a pentest with a security researcher that has reported vulnerabilities to you through your bug bounty program?&quot;<p>Budget permitting, this seems like a no brainer. I mean, they already have some familiarity with our app. The only thing I would be worried about is people gaming the system: finding some low hanging fruit or running their toolkits on a bunch of apps, then charging a lot of money and providing no more value.
评论 #17674584 未加载
eganistalmost 7 years ago
Your bullets all line up with what Synack and Cobalt.io are doing. How do you differentiate from the two of them, who themselves are already competing hard with each other? Both of them strictly curate their test base, allow for strictly-private programs, allow for researchers to work closely with firms for resolution, can launch and operate your whole program, and charge per finding.
评论 #17675256 未加载