Feeds

Google adds its Chrome extensions and apps to cash-for-cracks bounties

Ups serious open source fix reward to $10,000

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Google is so happy with its bug bounty program that it has increased the rewards given for flaw-finding and has added all of its home-grown apps and extensions for Chrome to the prize pot.

"We will broaden the scope of our vulnerability reward program to also include all Chrome apps and extensions developed and branded as 'by Google,'" said Eduardo Vela Nava and Michal Zalewski from the Google security team in a blog post.

"We think developing Chrome extensions securely is relatively easy (given our security guidelines are followed), but given that extensions like Hangouts and GMail are widely used, we want to make sure efforts to keep them secure are rewarded accordingly."

In November, Google paid an undisclosed sum to security researcher Oren Hafif after he spotted a "high impact" flaw in Gmail that allowed account hijacking. Under the new bounty program he'd probably have got the maximum $10,000 award for a serious flaw, but Google is now offering a minimum of $500 for more minor problems in its Chrome ecosystem.

Google has also seriously increased the bounties for its patch reward program (started last October) for open source code, such as the Linux kernel, OpenSSL, and BND DNS software. The original price range for flaws was between $500 and $3,133.70, but this is now only going to apply to "submissions that are very simple or that offer only fairly speculative gains."

Now there's a new $10,000 bounty for complex fixes that provide provable plugs to major security holes in the open source hit list, and a $5,000 runner's up bonus for "moderately complex patches that provide convincing security benefits." Open source security researchers can also earn up to $5,000 from Microsoft and Facebook.

Google has every reason to be pleased with its bug bounty program. Research shows the firm pays out about around $500 a day to independent security researchers, but that translates into major benefits when bug hunters find flaws in software before criminals do.

Crowdsourcing bug hunts is more efficient than having an in-house security team (although both are necessary) and the Chocolate Factory uses the system more than most. It seems odd nowadays, but it used to be a point of controversy to pay for flaw-finding – yet even Microsoft broke its bug-bounty virginity last year.

The addition of Google's Chrome extensions and applications to the bounty program is also an economically sensible move ahead of next month's Pwnium competition at CanSecWest. Google has $2.7m up for grabs, and paying out a few $10,000 bounties beforehand could save the firm a lot of cash in March. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.