Security Blog

The latest news and insights from Google on security and safety on the Internet

Rewarding web application security research

November 1, 2010
Share on Twitter Share on Facebook
Google

31 comments :

Oscar said...

This is a really good approach. It rewards people for pushing the boundaries of the software and finding issues with it. I wish the Diaspora guys had something like this in place.

November 1, 2010 at 4:00 PM
Unknown said...

Excellent effort by Google (clap clap clap)

November 1, 2010 at 4:49 PM
Unknown said...

I was just talking to someone about the recent vulns found in the android kernel from HTC being a good argument for "no more free bugs". This is great news. I look forward to them expanding the program to android.

November 1, 2010 at 4:58 PM
Anonymous said...

Rewards programs like this are legally interesting. I don't know if it's legally possible to participate in this program without breaking an "attempted computer intrusion" law.

November 1, 2010 at 5:20 PM
Unknown said...

I'm sure the young hackers among us will be interested in precisely what you mean by
"This program is also not open to minors", in particular, what jurisdiction applies in determining the age or majority.

November 1, 2010 at 6:11 PM
rjwalltech said...

Mark, they probably mean the age in which a person is allowed to vote. In the U.S. this means 18.

November 1, 2010 at 6:47 PM
Maxwell said...

Is there a reason for the no-minors restriction?

November 1, 2010 at 7:51 PM
jcwayne said...

Maxwell, in many (most?) jurisdictions there are various legal restrictions regarding how companies interact with minors (especially when money is involved). I'm sure the intent here is to avoid the need to involve lawyers in validating the legality of giving an award in any particular case. That said, I would suggest any minor looking to claim a reward simply have a parent or other trusted adult apply on their behalf.

November 1, 2010 at 9:21 PM
Arthur said...

@oscar Diaspora is software in pre-alpha state, it's open sourced, it has no current user base, no revenue stream, it's currently being supported entirely by donations it received, and there's only 4 people at the company. This model of paying for security bugs has absolutely no feasibility or relevance at this point to Diaspora.

November 1, 2010 at 9:38 PM
Unknown said...

Do, *.blogger.com is included... but is *.blogspot.com?

November 2, 2010 at 1:48 AM
Anonymous said...

There is a large section of the community who see bug hunting for money as a diss and are not interested in it and will not associate with any company offering money.

This programme won't help your plight, but send people walking further away.

Google should not be limiting their scope to draw in good bug hunters, but this is exactly the effect offering money will have.

This is not in the best interest of security.

Andrew

November 2, 2010 at 7:57 AM
Unknown said...

Are vulnerabilities in the reCaptcha service elegible for the reward?

If so, what is the scope in this case about what would be considered a vulnerability?

November 2, 2010 at 8:05 AM
Unknown said...

You have some "buggy links" on the Hall of Fame page:
For most of the HOF entries, clicking on the bug number takes me to the report page. However, some of the bug numbers take me to a page promoting Google Project Hosting. I didn't check all numbers but here are the problematic ones I found: 51630, 48283, 51070. There are probably others too.

By the way, searching the HOF page or the other related linked pages, I didn't see any directions on how to contact anybody to report such issues about the web pages. That's why I'm posting it here. It would be nice to add some contact info to those pages.

November 2, 2010 at 2:11 PM
Unknown said...

This is still pathetic and ridiculous, "$3,133.7 dollars" that is it!!! a company as big as Google and only pays $3K and not just for any bugs, the "severe and unusual" are you serious?! , a severe and unusual bug would be sold somewhere else for thousands, and EAP/ZDI/iDefense pays more than $3K (if you provide accurate details for the bug) for the not severe and unusual ones.

so why again would Google bother and announce this?

November 2, 2010 at 3:17 PM
Chris Evans said...

@Selim: I think the Chromium Hall of Fame links are ok. You're not seeing a promotion page, but a login page. Some of the bugs are still "hidden" when they are fixed in Chromium but might still affect the products of other vendors which use the same underlying libraries.

@Netdev: as clearly stated, the rewards can be donated to charity. This gives hackers who get their buzz via non-monetary means to make the world better in two different ways at once.

November 2, 2010 at 3:19 PM
Anonymous said...

I don't see how would finding bugs in software would ever make the world for a better place.

This 3K offer might be pathetic but for some minor XSS problems and other stuff it well worth it if you put into 10-20 hours work.

Anyway now that they announced it to the public and thousands of newsportals advertising it this bughunt will also exhaust. Like any other opportunities online to make money eg: elance.

Even if you find some bugs theres a good chance someone did it already and you wasted your time, google wont pay for it.

November 2, 2010 at 5:39 PM
Muhammad Huzaifa Ali said...

I have found a bug in Google Buzz this bug also indirectly effect Google Adsense program which results in false clicks and google TOS breach.

I do not know whether google buzz is included in this program.

November 2, 2010 at 11:33 PM
Unknown said...

I bet Apple would do the same thing.

November 3, 2010 at 3:14 PM
test12563 said...

great.. I'll try ;)

November 6, 2010 at 2:27 PM
Unknown said...

I just passed the "Gmail Security Verification" questionnaire in Russian, and found one small mistake:

on the last step there I see Romanian "Selectaţi „Rămâneţi conectat(ă)” numai dacă vă conectaţi de pe un computer personal.", that cannot be understood by Russian. Please fix it.

Thanks

November 11, 2010 at 4:11 AM
Jay said...

Thanks for your report, GeniU$. We have passed your comment to the appropriate team to investigate and make a correction.

Google Operations Team

November 11, 2010 at 1:31 PM
Adriano Morgon said...

Hi, i'm from Brazil, here the version 8.0.552.224 of Google Chrome returns many pages using orkut.com, it's very unconfortable. Thank You, and sorry for the worst english ):

December 30, 2010 at 7:52 PM
Pedro said...

Hi, i send one email about google adsense bugs, its a very dangerous bug make 5 day and google dont have-me send any feedback, i just whait google fix to publish on some security blogs, sorry bad english

January 3, 2011 at 12:44 AM
Unknown said...

Hey blackmind

Can you please post the ID number you received in the auto-reply? It should be in the subject header.

thanks,
Adam

January 4, 2011 at 12:30 PM
Pedro said...

Hi adam, the id is 740250882

Tks

January 4, 2011 at 2:12 PM
Kirk Gehman said...

I assume the cash reward is not available to Google developers :-)

February 7, 2011 at 7:00 AM
test2009 said...

Hello.

These sites are included in the awards program ?

admob.com
googlestore.com
gizmoproject.com
gizmo5.com
picnik.com
on2.com
googleusercontent.com
opensocial.org
whatbrowser.org
googledeveloperday.com
zeitgeistminds.com

April 7, 2011 at 4:35 AM
jaumlucas said...

feedburner.com is on the scope of reward program?

May 31, 2011 at 10:11 AM
Sagan Marketing said...

It's a good idea but I agree that the money reward is not worth it... most hackers would be able to see such security bugs for more money than than in other markets... plus those of us who would be willing to invest time into finding such bugs would need a bigger reward than $500 with a chance of $3k... maybe if they did $3k with a chance of $10k... we live in a world where those of us with skills value our time very much... still I'll be on the lookout for anything I can spot indirectly...

February 13, 2012 at 1:30 AM
Anonymous said...

Why do I have to have a cellphone?I've been asked for a mobile number again when I made it clear days ago I don't have a cellphone.

I was instead provided with a verification e-mail.

I can barely get the hang of the newer ones and I have trouble with using text on cellphones.

May 23, 2012 at 10:38 AM
Unknown said...

Hi.

What about Android platform? It's in the program or it isn't?

May 14, 2013 at 10:26 AM

Post a Comment

  

Labels


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2024
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2023
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2022
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2021
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2020
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2019
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2018
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2017
    • Dec
    • Nov
    • Oct
    • Sep
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2016
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2015
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2014
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • Apr
    • Mar
    • Feb
    • Jan
  •     2013
    • Dec
    • Nov
    • Oct
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2012
    • Dec
    • Sep
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2011
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
  •     2010
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • May
    • Apr
    • Mar
  •     2009
    • Nov
    • Oct
    • Aug
    • Jul
    • Jun
    • Mar
  •     2008
    • Dec
    • Nov
    • Oct
    • Aug
    • Jul
    • May
    • Feb
  •     2007
    • Nov
    • Oct
    • Sep
    • Jul
    • Jun
    • May

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms