logoalt Hacker News

weppleyesterday at 6:10 PM0 repliesview on HN

> but demonstrating a reliable way to exploit them

Is this a requirement for most bug bounty programs? Particularly the “reliable” bit?