HACKER2.0

The platform built because the old one is broken.

For Researchers

No more "Intended Behavior" or unverifiable "Duplicate" claims after a silent patch. Escrow releases automatically the moment a fix is detected — no human can override it.

  • Escrow-backed bounties, released on patch detection
  • No reputation gatekeeping on dispute access
  • Three independent triagers — every decision has a written reason
  • Duplicate claims require a registry entry, not just a claim

For Programs

Transparency protects you. The researchers who go public, file legal demands, and contact journalists are almost never the ones who got a fair explanation. They're the ones who got silence.

  • Verified security attestation — proof you take researchers seriously
  • Reduced legal and PR risk through documented process
  • High-signal reports from verified researchers only
  • Automated triage efficiency — no manual payment delays

The Problem

Bug bounty platforms are supposed to be neutral. They're not.

HackerOne, Bugcrowd, Intigriti — their customer is the company. The researcher is the product. When a dispute happens, the platform sides with whoever pays the bills.

Researchers get:

"A CVSS 10.0 vulnerability in Stripe's MCP infrastructure was patched on a Sunday in 12 hours — then called 'intended behavior' to avoid a bounty. The report it was marked duplicate of was itself Informative, $0 paid. The 'duplicate' title contained the word 'phishing' — likely auto-categorised as out of scope before any human read it. Two layers of automation buried a critical security fix. Nobody explained anything."

— documented case, March 2026

This isn't a theory. It's documented. And it's not one researcher — it's the business model.

26
Bugs submitted by founder
1
Paid out
12hrs
Stripe patched after report
$0
Paid for that patch

How HACKER2.0 Works Differently

1

Escrow Before Programs Open

Companies fund an escrow account through a third-party payment processor before a single report can be submitted. The platform never holds the money. The company never holds the money. Independent escrow, released only on verified resolution. No funds, no program.

2

The Bug Registry

Every company joining must submit a registry of known bugs — current, in-progress, acknowledged-but-unpatched — encrypted and hashed. If a company claims duplicate, the duplicate must exist in the registry before the report was submitted. No entry, no duplicate claim. Full stop. If a company patches something matching an open report, escrow releases automatically. If a company claims "intended behavior" and patches it anyway, the researcher gets a defined partial bounty from escrow within a set number of days.

3

Three Independent Triagers

No single triager makes a decision. Three senior researchers assess each report independently with no communication between them. All three agree → automatic resolution. Split decision → all reasoning is published in a visible chat readable by both parties in real time. Either party disagrees → formal mediation with the full transcript as the record. Triagers earn platform standing, not money — no financial incentive to side either way.

4

Transparent Dispute Record

Every decision, every piece of reasoning, every timeline event is logged and visible to both parties. Not to the public — to the people involved. No more "we can't share that information." If a duplicate is claimed, the researcher sees the matching registry entry. If a severity is downgraded, the reasoning is written down and signed off by all three triagers. Silence is not an option.

5

Researcher Onboarding — Two Tracks

Fast track: Verified high-reputation researchers from HackerOne, Bugcrowd, Intigriti — already vetted, invite directly.
Earned entry: PortSwigger Web Security Academy completion, HackTheBox/TryHackMe progress, documented CTF results. Proof of genuine learning, not just a username. Both tracks require real identity verification — not public, just confirmed.

The Three Principles HACKER2.0 Will Not Compromise

01

No decision without a written reason. Every outcome has a documented explanation visible to the affected parties. Always. No exceptions.

02

No duplicate without proof. Duplicate claims require a registry entry that predates the report. If it's not documented before the report came in, it's not a duplicate.

03

No escrow discretion. Patch detection and registry matching trigger automatic payment. Humans review grey areas. Humans do not override black and white.

⚠️ DECLASSIFICATION IN PROGRESS: VIEW COUNTDOWN

The current model is built on trust that doesn't exist.
We're building the protocol that doesn't need it.

✓ Your signal has been received. You are on the waitlist.
⚠ Transmission failed. Please try again.