# Introduction

## About Us

Welcome to Bypassec, the first hacking competition platform for applications. Our mission is to provide a secure and collaborative environment where companies can test their applications through a new model that combines the best of both worlds: **pentesting** and **bug bounty**.

Inspired by the success of blockchain security contest platforms, we are bringing this approach to the general applications landscape, allowing organizations of all sizes to benefit from the collective intelligence of the world’s top security researchers.

## Our Approach

Bypassec allows companies to launch [hacking competitions](https://docs.bypassec.com/a-plataforma/hacking-competitions) to uncover vulnerabilities in their applications with a flexible and transparent structure. Organizations can define their own testing policies and scope, gaining access to hundreds of security researchers simultaneously.

Unlike traditional bug bounty programs, where payments are made per individual flaw, Bypassec utilizes a dedicated reward pool. A fixed amount is deposited into this pool and distributed proportionally among researchers who report valid vulnerabilities at the end of the competition. This model incentivizes a deeper, more collaborative analysis rather than just a race for the first finding.

## How It Works

<figure><img src="https://1280147-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFP6pzVprfiCeyXuo0L4T%2Fuploads%2F5H1S8dttycTlFHWMQ9Ow%2FEmpresa.png?alt=media&#x26;token=5833385e-0e2e-4a9d-b601-4d3816dce365" alt=""><figcaption></figcaption></figure>

1. <mark style="color:green;">**Competition Creation:**</mark>
   * Companies define the scope, rules, and testing policies for their applications.
   * A pre-defined amount is deposited into a reward pool, which will be used to compensate researchers.
2. <mark style="color:green;">**Participation:**</mark>
   * Security researchers join competitions, testing applications according to the established guidelines.
   * Identified vulnerabilities are submitted directly through the platform.
3. <mark style="color:green;">**Validation:**</mark>
   * Every reported discovery is validated and triaged by the Bypassec team.
   * Valid vulnerabilities are rewarded, ensuring researchers are compensated for their expertise.
4. <mark style="color:green;">**Results:**</mark>
   * Once the competition concludes, all valid vulnerabilities become available on the host company’s real-time dashboard.

## Our Vision

Na Bypassec, acreditamos que a segurança de aplicações deve ser acessível e eficiente. Nosso objetivo é criar uma comunidade robusta de pesquisadores de segurança e empresas, trabalhando juntos para identificar e mitigar vulnerabilidades antes que possam ser exploradas. Estamos comprometidos em elevar o padrão de segurança de aplicações, saindo da zona de conforto e vício dos pentests, promovendo um ecossistema de confiança e colaboração.
