The hacker is then led to the Devfolio hacker dashboard where he/she will need to complete their profile, filling out the information in different sections. We’ve ensured all the information needed has been covered through the fields asked for in the sections, as shown below.





