Skip to main content

HackerOne

HackerOne is a vulnerability coordination and bug bounty program that companies use to invite hackers to find security vulnerabilities in their systems. By integrating HackerOne with Brinqa, you can bring in activity data, pentest findings, and discovered weaknesses to prioritize and mitigate potential risks, gain insights into your attack surface, and enhance your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with HackerOne and how to obtain that information from HackerOne. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select HackerOne from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate HackerOne with Brinqa:

  • API URL: The HackerOne API URL. The default URL is https://api.hackerone.com.

  • API ID and API key: The API credentials associated with the HackerOne user, which must have permissions to log in to the API server and return data.

Generate a HackerOne API ID and API key

For the HackerOne connector to use the HackerOne API, you must provide the API ID and API key from HackerOne. Only HackerOne program administrators can generate API keys. To generate a new HackerOne API key, follow these steps:

  1. Log in to your HackerOne account as an administrator.

  2. Navigate to Organization Settings > API Tokens.

  3. Click Create API Token.

  4. Give the new API token an identifier. The identifier must begin with a letter or a number and can only contain letters, numbers, hyphens, or underscores.

    • The identifier is the API ID that is used for authenticating the HackerOne connector with Brinqa. The API ID is case sensitive.
  5. Select the Admin and Standard groups. Both are required for the HackerOne connector to work with Brinqa. The Admin group grants permissions to collect Program data while the Standard group grants permissions to collect Report data.

  6. Click Add API token.

    Your new API key displays. You cannot view the key again. Copy the token and save it in a secure location.

  7. Click I have stored the API token.

note

For additional information on API tokens, see the HackerOne documentation.

Additional settings

The HackerOne connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.

  • Parallel requests: The maximum number of parallel API requests. The default setting is 4.

Types of data to retrieve

The HackerOne connector can retrieve the following types of data from the HackerOne API:

Table 1: Data retrieved from HackerOne

Connector ObjectRequiredMaps to Data Model
ActivityNoNot mapped
Pentest FindingYesPentest Finding
Pentest Finding DefinitionYesPentest Finding Definition
SiteYesSite
WeaknessNoWeakness
info

For detailed steps on how to view the data retrieved from HackerOne in the Brinqa Platform, see How to view your data.

Attribute mappings

Click the tabs below to view the mappings between the source and the Brinqa data model attributes.

Table 2: Pentest Finding attribute mappings

Source Field NameMaps to Attribute
program.handleLocal variable
report.assigneeLocal variable
report.bounties.amountLocal variable
report.closedAtLocal variable
report.createdAtfirstFound
report.disclosedAtLocal variable
report.FirstReporterActivityAtLocal variable
report.iduid
report.issueTrackerReferenceIdLocal variable
report.lastActivityAtLocal variable
report.lastProgramActivityAtLocal variable
report.lastPublicActivityAtLocal variable
report.lastReporterActivityAtLocal variable
report.reporterLocal variable
report.reporterAgreedOnGoingPublicAtLocal variable
report.sourceLocal variable
report.statestatus, statusCategory
report.structured_scope.asset_identifiertargets
report.swagAwardedAtLocal variable
report.title & report.vulnerability_informationtype
report.triagedAtLocal variable
report.updatedAtlastFound
report.weaknessLocal variable
report.bountyAwardedAtLocal variable
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Operation options

The HackerOne connector supports the following operation options. See connector operation options for information about how to apply them.

Table 6: HackerOne connector operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
Pentest Findingseveritynone, low, medium, high, criticalRetrieve pentest findings by the specified severity level.Key: severity Value: critical. This key and value combination only retrieves pentest findings with a critical severity level.
statenew, triagedRetrieve pentest findings by the specified state.Key: state Value: new. This key and value combination only retrieves new pentest findings.
Pentest Finding Definitionseveritynone, low, medium, high, criticalRetrieve pentest finding definitions by the specified severity level.Key: severity Value: high. This key and value combination only retrieves pentest finding definitions with a high severity level.
statenew, triagedRetrieve pentest finding definitions by the specified state.Key: state Value: triaged. This key and value combination only retrieves pentest finding definitions that have been triaged.
Siteseveritynone, low, medium, high, criticalRetrieves sites by the specified severity level.Key: severity Value: medium. This key and value combination only retrieves sites with a medium severity level.
statenew, triagedRetrieves sites by the specified state.Key: state Value: new. This key and value combination only retrieves new sites.
note

The option keys and values are case-sensitive as they are shown in this documentation.

APIs

The HackerOne connector uses the HackerOne API. Specifically, it uses the following endpoints:

Table 7: HackerOne API Endpoints

Connector ObjectAPI Endpoint
ActivityGET https://api.hackerone.com/v1/me/programs
GET https://api.hackerone.com/v1/incremental/activities
Pentest FindingGET https://api.hackerone.com/v1/me/programs
GET https://api.hackerone.com/v1/reports
Pentest Finding DefinitionGET https://api.hackerone.com/v1/me/programs
GET https://api.hackerone.com/v1/reports
SiteGET https://api.hackerone.com/v1/me/programs
GET https://api.hackerone.com/v1/reports
WeaknessGET https://api.hackerone.com/v1/{programId}/weaknesses

Changelog

The HackerOne connector has undergone the following changes:

3.0.5

3.0.4

  • Fixed an issue where findings with an "Informational" status in HackerOne were incorrectly marked as "Active" in Brinqa instead of "Fixed".

3.0.3

  • Added the SOURCE_STATUS attribute to the Pentest Finding object.

3.0.2

  • Fixed an issue with the SOURCE_SEVERITY attribute on the Pentest Finding Definition object.

3.0.1

  • Added a check for null values in the Activity object.

  • Addressed the HTTP 429 error when using multiple threads.

3.0.0