» » Google Launches Bug Bounty Program for Open Source Projects

Google Launches Bug Bounty Program for Open Source Projects

Google Launches Bug Bounty Program for Open Source Projects

Residence › Utility Safety

Google Launches Bug Bounty Program for Open Supply Initiatives

By Ionut Arghire on August 30, 2022

Tweet

Google in the present day launched a brand new bug bounty program to reward safety researchers who uncover and report vulnerabilities within the firm’s open supply initiatives.

As a part of the brand new Open Supply Software program Vulnerability Rewards Program (OSS VRP), Google is providing bug bounty payouts of as much as $31,337. The bottom vulnerability reward can be $100.

Small bonus will increase – of roughly $1,000 – could also be awarded for “significantly intelligent or attention-grabbing vulnerabilities”.

Google has been working its VRP for nearly 12 years and has expanded it in time, to cowl Android, Chrome, Linux kernel, and different areas. To this point, the corporate has paid over $38 million in bug bounty rewards to the reporting researchers.

Targeted on open supply software program, the brand new program is supposed to deal with the dangers related to provide chain compromise.

“Final 12 months noticed a 650% year-over-year improve in assaults concentrating on the open supply provide chain, together with headliner incidents like Codecov and Log4Shell that confirmed the harmful potential of a single open supply vulnerability,” Google notes.

The web large considers all up-to-date software program out there within the public repositories of Google-owned GitHub organizations as being inside the scope of the OSS VRP. The third-party dependencies of those initiatives are additionally included, however researchers must ship prior notification to the dependency.

“Please ship your bug reviews on to the proprietor of the susceptible bundle first and be certain that the problem is addressed upstream earlier than letting us know of the problem particulars,” the corporate explains on the OSS VRP’s web page.

In-scope initiatives are grouped into three tiers, with rewards for vulnerabilities in flagship OSS initiatives – that are thought of significantly delicate – being considerably larger. The highest payouts can be supplied for flaws in Bazel, Angular, Golang, Protocol buffers, and Fuchsia.

The web large encourages researchers to concentrate on vulnerabilities main to produce chain compromise, on design points resulting in product flaws, and on safety points reminiscent of credential leaks, weak passwords, and insecure installations.

Associated: Google Paid Out $8.7 Million in Bug Bounty Rewards in 2021

Associated: Microsoft Paid $13.7 Million by way of Bug Bounty Packages Over Previous Yr

Associated: Google Open Sources ‘Paranoid’ Crypto Testing Library

Associated: Google Groups Up With GitHub for Provide Chain Safety

Get the Day by day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Google Launches Bug Bounty Program for Open Supply Initiatives
  • FBI Warns of Surge in Assaults Concentrating on DeFi Platforms
  • Pwn2Own Gives $100,000 for Residence Workplace Hacking Situation
  • Elon Musk Subpoenas Twitter Whistleblower Forward of Trial
  • FTC Accuses Information Dealer of Promoting Delicate Location Information
  • Okta Impersonation Approach Could possibly be Utilized by Attackers
  • Galois Open Sources Instruments for Discovering Vulnerabilities in C, C++ Code
  • Okta Says Buyer Information Compromised in Twilio Hack
  • ‘Tape or Chewing Gum:’ Twitter’s Lapses Echo Worldwide
  • Malicious Plugins Discovered on 25,000 WordPress Web sites: Examine

Searching for Malware in All of the Unsuitable Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act By means of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

The way to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

The way to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles