Feeds

Google adds its Chrome extensions and apps to cash-for-cracks bounties

Ups serious open source fix reward to $10,000

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Google is so happy with its bug bounty program that it has increased the rewards given for flaw-finding and has added all of its home-grown apps and extensions for Chrome to the prize pot.

"We will broaden the scope of our vulnerability reward program to also include all Chrome apps and extensions developed and branded as 'by Google,'" said Eduardo Vela Nava and Michal Zalewski from the Google security team in a blog post.

"We think developing Chrome extensions securely is relatively easy (given our security guidelines are followed), but given that extensions like Hangouts and GMail are widely used, we want to make sure efforts to keep them secure are rewarded accordingly."

In November, Google paid an undisclosed sum to security researcher Oren Hafif after he spotted a "high impact" flaw in Gmail that allowed account hijacking. Under the new bounty program he'd probably have got the maximum $10,000 award for a serious flaw, but Google is now offering a minimum of $500 for more minor problems in its Chrome ecosystem.

Google has also seriously increased the bounties for its patch reward program (started last October) for open source code, such as the Linux kernel, OpenSSL, and BND DNS software. The original price range for flaws was between $500 and $3,133.70, but this is now only going to apply to "submissions that are very simple or that offer only fairly speculative gains."

Now there's a new $10,000 bounty for complex fixes that provide provable plugs to major security holes in the open source hit list, and a $5,000 runner's up bonus for "moderately complex patches that provide convincing security benefits." Open source security researchers can also earn up to $5,000 from Microsoft and Facebook.

Google has every reason to be pleased with its bug bounty program. Research shows the firm pays out about around $500 a day to independent security researchers, but that translates into major benefits when bug hunters find flaws in software before criminals do.

Crowdsourcing bug hunts is more efficient than having an in-house security team (although both are necessary) and the Chocolate Factory uses the system more than most. It seems odd nowadays, but it used to be a point of controversy to pay for flaw-finding – yet even Microsoft broke its bug-bounty virginity last year.

The addition of Google's Chrome extensions and applications to the bounty program is also an economically sensible move ahead of next month's Pwnium competition at CanSecWest. Google has $2.7m up for grabs, and paying out a few $10,000 bounties beforehand could save the firm a lot of cash in March. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.