Quick Start Guide
Get your first security scan running in under 5 minutes.
Step 1: Sign Up
Create your Hacker Bot account to get started. No credit card required for the free trial.
Create AccountStep 2: Connect Your Repository
Link your GitHub repository to enable findings as Issues and CI/CD integration.
- Go to Settings → Integrations
- Click Connect GitHub
- Authorize Hacker Bot to access your repositories
- Select the repositories you want to scan
Step 3: Authorization Requirements
Before scanning, you must complete both technical verification and legal authorization.
⚠️ Legal Agreement Required
Every project and domain must have a signed authorization agreement with a verified legal contact before any scanning can begin.
- A legal representative must sign our Authorization Agreement
- Identity verification is performed via third-party services (ID verification)
- If identity cannot be validated, we cannot perform security testing
- This protects both parties and ensures compliance with applicable laws
Technical Verification
In addition to the legal agreement, you must prove domain ownership using one of these methods:
1 DNS TXT Record
Add a TXT record to your domain's DNS configuration:
Your unique verification token is available in your dashboard after starting the authorization process.
2 Verification File
Place a verification file at one of these locations on your domain:
The file must contain your unique verification token: hb_xxxxxxxxxxxx
Verification Timeline
- • DNS records: May take up to 24-48 hours to propagate
- • File verification: Immediate once file is accessible
- • Legal agreement: 1-3 business days for identity verification
Step 4: Run Your First Scan
Once verified, you're ready to launch your first attack.
- Click New Scan from the dashboard
- Enter your target URL (e.g.,
https://app.example.com) - Select a scan profile (Quick, Standard, or Deep)
- Click Start Attack
Step 5: Review Findings
As the scan runs, findings appear in real-time. Each finding includes:
- Severity rating (Critical, High, Medium, Low)
- Detailed description of the vulnerability
- Proof of concept (where safe)
- Step-by-step remediation guidance
- References to CWE, OWASP, and other standards
🎉 You're Ready!
You've completed your first scan. Explore the docs to learn about authenticated scanning, CI/CD integration, and advanced features.