An AI-powered command center for managing security vulnerability reports β built for speed, clarity, and researcher trust.
A bug bounty program is when a company pays security experts (called "researchers") to find and report security holes in their software. Think of it like a reward system for digital detectives!
The problem is simple: security teams get flooded with vulnerability reports and need a way to sort, score, and respond to them fast. Without a system, important issues get lost in the noise and researchers wait weeks for a reply.
BountyOps is the operations center that makes that possible.
| Feature | What It Does | Powered By |
|---|---|---|
| Triage Queue | A organized list of all incoming reports that can be filtered by severity, status, and type | React + TypeScript |
| AI Triage Agent | Instantly reads new reports and suggests severity level and vulnerability type | Vercel AI SDK + OpenAI |
| Duplicate Detection | Automatically checks if a new report is a duplicate of an existing one | Vercel AI SDK + OpenAI |
| CVSS Scoring Agent | Interactive chat that asks questions and calculates a standardized risk score (0-10) | Vercel AI SDK + OpenAI |
| Response Drafter | Generates professional, friendly responses to security researchers | Vercel AI SDK + OpenAI |
| Program Intelligence Chat | Ask questions about program health in plain English and get instant answers | Vercel AI SDK + OpenAI |
| Submit a Report Form | A public-facing form for researchers to submit vulnerability reports | React + Framer Motion |
| Program Health Dashboard | Real-time charts showing SLO compliance, report volume, and vulnerability breakdown | Recharts |
graph TD
A[Researcher submits report] --> B[AI Triage Agent classifies severity]
B --> C[Duplicate Detection runs automatically]
C --> D{Is Duplicate?}
D -->|Yes| E[Flag + link to original]
E --> F[Notify researcher]
D -->|No| G[Enter Triage Queue]
G --> H[Analyst reviews + confirms AI scoring]
H --> I[CVSS Score calculated]
I --> J[Status updated]
J --> K[Response Drafter generates researcher reply]
K --> L[Researcher notified]
L --> M{Valid Report?}
M -->|Yes| N[Bounty awarded + Closed]
M -->|No| O[Closed with explanation]
style A fill:#10B981,color:#fff
style N fill:#10B981,color:#fff
style O fill:#06B6D4,color:#fff
π‘ Every AI action is a suggestion β the human analyst always has final say.
The Triage Agent reads incoming vulnerability reports and suggests a severity level and vulnerability type.
sequenceDiagram
participant R as Researcher
participant A as Triage Agent
participant D as Report Data
R->>A: Submits report (title, description, steps)
A->>D: Analyze report content
D->>A: Returns analysis
A->>R: Returns severity + vuln type + confidence score
Why it matters: Instead of manually reading every report, analysts get instant AI-powered suggestions that speed up the triage process by 10x.
The Duplicate Detection Agent checks if the same issue was already reported.
sequenceDiagram
participant R as Researcher
participant A as Duplicate Agent
participant D as Existing Reports
R->>A: Submits new report
A->>D: Compare against all existing reports
D->>A: Returns similarity matches
A->>R: Returns isDuplicate + matched report link
Why it matters: Duplicate reports waste analyst time. Catching them automatically saves hours every week.
The CVSS Scoring Agent asks 5 questions and calculates a standardized risk score (0-10).
sequenceDiagram
participant A as Analyst
participant C as CVSS Agent
A->>C: Start CVSS scoring
C->>A: Question 1: Attack Vector?
A->>C: Answer (e.g., Network)
C->>A: Question 2: Complexity?
A->>C: Answer (e.g., Low)
C->>A: Question 3: Privileges Required?
C->>A: Question 4: User Interaction?
C->>A: Question 5: Scope?
C->>A: Question 6-7: Impacts?
C->>A: Returns CVSS vector + score + severity
Why it matters: CVSS is the industry standard for severity scoring. The agent makes it easy to calculate consistently.
The Response Drafter writes professional, friendly replies to security researchers.
sequenceDiagram
participant A as Analyst
participant R as Response Agent
A->>R: Request draft (report details, disposition)
R->>A: Streams friendly, professional response
A->>R: Edit if needed
A->>R: Copy and send to researcher
Why it matters: Researchers appreciate fast, personalized responses. The agent ensures every reply is warm and specific.
The Program Intelligence Agent answers plain English questions about program health using live data.
sequenceDiagram
participant A as Analyst
participant I as Intel Agent
participant D as Report Data
A->>I: "What's our SLO trend?"
I->>D: Query queue stats + trends
D->>I: Returns data
I->>A: "Your SLO is at 87% this week..."
Why it matters: Managers need instant answers about program health without digging through spreadsheets.
The Dashboard shows 4 key metrics that matter:
| KPI | What It Means |
|---|---|
| Open Reports | How many reports are waiting to be reviewed right now |
| SLO Compliance % | The percentage of reports responded to on time (SLO = "we promise to reply within X days") |
| Avg. Time to Triage | How fast the team is reviewing reports on average |
| Reports Closed This Week | Weekly output β how many reports got resolved this week |
xychart-beta
title "Reports This Week"
x-axis ["Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun"]
y-axis "Reports" 0 --> 25
bar [12, 8, 15, 6, 20, 9, 4]
pie
title "Vulnerability Types Found"
"IDOR (data leakage)" : 28
"XSS (script injection)" : 22
"SSRF (server-side request)" : 15
"Auth Bypass" : 18
"CSRF (cross-site request)" : 9
"Other" : 8
"How the pieces fit together."
graph LR
Browser[Browser<br/>User Interface] -->|HTTP requests| NextJS[Next.js<br/>Frontend]
NextJS -->|API calls| API[Next.js<br/>API Routes]
API -->|Agent tool calls| AITool[Vercel AI SDK]
AITool -->|LLM requests| LLM[OpenAI /<br/>Anthropic]
LLM -->|AI responses| AITool
AITool -->|Structured JSON| API
API -->|Report data| Store[(In-Memory<br/>JSON Store)]
style Browser fill:#06B6D4,color:#fff
style NextJS fill:#10B981,color:#fff
style API fill:#10B981,color:#fff
style LLM fill:#6366F1,color:#fff
style Store fill:#F59E0B,color:#fff
- Browser β The user sees the React dashboard
- Next.js Frontend β Handles routing and UI rendering
- Next.js API Routes β Backend logic and agent endpoints
- Vercel AI SDK β Connects to OpenAI/Anthropic for AI capabilities
- In-Memory Store β Holds all report data (JSON file)
- Node.js 18 or higher
- An OpenAI or Anthropic API key
# Clone the repository
git clone https://github.com/AnandSundar/BountyOps.git
# Go into the folder
cd BountyOps
# Install dependencies
npm install
# Copy the example environment file
cp .env.example .env.local
# Add your OpenAI API key to .env.local
# OPENAI_API_KEY=your_key_here
# Start the development server
npm run devThen open http://localhost:3000 in your browser.
π‘ No API key? The app runs fully without one β AI features will show a friendly "unavailable" state and all manual workflows still work.
bountyops/
βββ app/ # Next.js app router pages
β βββ page.tsx # Dashboard with KPIs and charts
β βββ reports/ # Report Queue and detail views
β βββ respond/ # Response drafting center
β βββ submit/ # Public report submission form
β βββ researchers/ # Researcher leaderboard
β βββ api/
β βββ agents/ # AI agent API routes
β βββ triage/ # Triage agent
β βββ duplicate-check/ # Duplicate detection
β βββ cvss/ # CVSS scoring
β βββ draft-response/ # Response drafter
β βββ intel/ # Program intelligence
βββ components/ # Reusable UI components
β βββ ui/ # Base components (buttons, badges, cards)
β βββ layout/ # Sidebar, header, footer
β βββ reports/ # Report-specific components
βββ lib/ # Utilities and mock data
βββ public/screenshots/ # Dashboard screenshots
βββ data/ # Mock vulnerability reports
Potential future features:
- Real database backend (PostgreSQL via Supabase)
- Webhook integration with HackerOne / Bugcrowd APIs
- Email notifications to researchers on status change
- Role-based access (Analyst vs. Program Manager view)
- Export reports to PDF / CSV
- Multi-program support
Built by Anand Sundar β a Software Engineering professional and Agentic AI Security Engineer specializing in cybersecurity analytics, GRC frameworks, threat detection, and vulnerability management, with a strong foundation in secure system design and automation.
This project was built to demonstrate real-world bug bounty operations skills, including triage workflows, AI-assisted severity scoring, and program health analytics.
MIT License β see LICENSE for details.