Report Management
Hackers submit vulnerabilities to your program through submitting reports. You can manage all incoming reports through your Inbox.
Check out this tutorial video on the life cycle of reports and the different parts of report management.