Security Blog

The latest news and insights from Google on security and safety on the Internet

Rewarding web application security research

1 noiembrie 2010
Share on Twitter Share on Facebook
Google

31 de comentarii :

Oscar spunea...

This is a really good approach. It rewards people for pushing the boundaries of the software and finding issues with it. I wish the Diaspora guys had something like this in place.

1 noiembrie 2010 la 16:00
Unknown spunea...

Excellent effort by Google (clap clap clap)

1 noiembrie 2010 la 16:49
Unknown spunea...

I was just talking to someone about the recent vulns found in the android kernel from HTC being a good argument for "no more free bugs". This is great news. I look forward to them expanding the program to android.

1 noiembrie 2010 la 16:58
Anonim spunea...

Rewards programs like this are legally interesting. I don't know if it's legally possible to participate in this program without breaking an "attempted computer intrusion" law.

1 noiembrie 2010 la 17:20
Unknown spunea...

I'm sure the young hackers among us will be interested in precisely what you mean by
"This program is also not open to minors", in particular, what jurisdiction applies in determining the age or majority.

1 noiembrie 2010 la 18:11
rjwalltech spunea...

Mark, they probably mean the age in which a person is allowed to vote. In the U.S. this means 18.

1 noiembrie 2010 la 18:47
Maxwell spunea...

Is there a reason for the no-minors restriction?

1 noiembrie 2010 la 19:51
jcwayne spunea...

Maxwell, in many (most?) jurisdictions there are various legal restrictions regarding how companies interact with minors (especially when money is involved). I'm sure the intent here is to avoid the need to involve lawyers in validating the legality of giving an award in any particular case. That said, I would suggest any minor looking to claim a reward simply have a parent or other trusted adult apply on their behalf.

1 noiembrie 2010 la 21:21
Arthur spunea...

@oscar Diaspora is software in pre-alpha state, it's open sourced, it has no current user base, no revenue stream, it's currently being supported entirely by donations it received, and there's only 4 people at the company. This model of paying for security bugs has absolutely no feasibility or relevance at this point to Diaspora.

1 noiembrie 2010 la 21:38
Unknown spunea...

Do, *.blogger.com is included... but is *.blogspot.com?

2 noiembrie 2010 la 01:48
Anonim spunea...

There is a large section of the community who see bug hunting for money as a diss and are not interested in it and will not associate with any company offering money.

This programme won't help your plight, but send people walking further away.

Google should not be limiting their scope to draw in good bug hunters, but this is exactly the effect offering money will have.

This is not in the best interest of security.

Andrew

2 noiembrie 2010 la 07:57
Unknown spunea...

Are vulnerabilities in the reCaptcha service elegible for the reward?

If so, what is the scope in this case about what would be considered a vulnerability?

2 noiembrie 2010 la 08:05
Unknown spunea...

You have some "buggy links" on the Hall of Fame page:
For most of the HOF entries, clicking on the bug number takes me to the report page. However, some of the bug numbers take me to a page promoting Google Project Hosting. I didn't check all numbers but here are the problematic ones I found: 51630, 48283, 51070. There are probably others too.

By the way, searching the HOF page or the other related linked pages, I didn't see any directions on how to contact anybody to report such issues about the web pages. That's why I'm posting it here. It would be nice to add some contact info to those pages.

2 noiembrie 2010 la 14:11
Unknown spunea...

This is still pathetic and ridiculous, "$3,133.7 dollars" that is it!!! a company as big as Google and only pays $3K and not just for any bugs, the "severe and unusual" are you serious?! , a severe and unusual bug would be sold somewhere else for thousands, and EAP/ZDI/iDefense pays more than $3K (if you provide accurate details for the bug) for the not severe and unusual ones.

so why again would Google bother and announce this?

2 noiembrie 2010 la 15:17
Chris Evans spunea...

@Selim: I think the Chromium Hall of Fame links are ok. You're not seeing a promotion page, but a login page. Some of the bugs are still "hidden" when they are fixed in Chromium but might still affect the products of other vendors which use the same underlying libraries.

@Netdev: as clearly stated, the rewards can be donated to charity. This gives hackers who get their buzz via non-monetary means to make the world better in two different ways at once.

2 noiembrie 2010 la 15:19
Anonim spunea...

I don't see how would finding bugs in software would ever make the world for a better place.

This 3K offer might be pathetic but for some minor XSS problems and other stuff it well worth it if you put into 10-20 hours work.

Anyway now that they announced it to the public and thousands of newsportals advertising it this bughunt will also exhaust. Like any other opportunities online to make money eg: elance.

Even if you find some bugs theres a good chance someone did it already and you wasted your time, google wont pay for it.

2 noiembrie 2010 la 17:39
Muhammad Huzaifa Ali spunea...

I have found a bug in Google Buzz this bug also indirectly effect Google Adsense program which results in false clicks and google TOS breach.

I do not know whether google buzz is included in this program.

2 noiembrie 2010 la 23:33
Unknown spunea...

I bet Apple would do the same thing.

3 noiembrie 2010 la 15:14
test12563 spunea...

great.. I'll try ;)

6 noiembrie 2010 la 14:27
Unknown spunea...

I just passed the "Gmail Security Verification" questionnaire in Russian, and found one small mistake:

on the last step there I see Romanian "Selectaţi „Rămâneţi conectat(ă)” numai dacă vă conectaţi de pe un computer personal.", that cannot be understood by Russian. Please fix it.

Thanks

11 noiembrie 2010 la 04:11
Jay spunea...

Thanks for your report, GeniU$. We have passed your comment to the appropriate team to investigate and make a correction.

Google Operations Team

11 noiembrie 2010 la 13:31
Adriano Morgon spunea...

Hi, i'm from Brazil, here the version 8.0.552.224 of Google Chrome returns many pages using orkut.com, it's very unconfortable. Thank You, and sorry for the worst english ):

30 decembrie 2010 la 19:52
Pedro spunea...

Hi, i send one email about google adsense bugs, its a very dangerous bug make 5 day and google dont have-me send any feedback, i just whait google fix to publish on some security blogs, sorry bad english

3 ianuarie 2011 la 00:44
Unknown spunea...

Hey blackmind

Can you please post the ID number you received in the auto-reply? It should be in the subject header.

thanks,
Adam

4 ianuarie 2011 la 12:30
Pedro spunea...

Hi adam, the id is 740250882

Tks

4 ianuarie 2011 la 14:12
Kirk Gehman spunea...

I assume the cash reward is not available to Google developers :-)

7 februarie 2011 la 07:00
test2009 spunea...

Hello.

These sites are included in the awards program ?

admob.com
googlestore.com
gizmoproject.com
gizmo5.com
picnik.com
on2.com
googleusercontent.com
opensocial.org
whatbrowser.org
googledeveloperday.com
zeitgeistminds.com

7 aprilie 2011 la 04:35
jaumlucas spunea...

feedburner.com is on the scope of reward program?

31 mai 2011 la 10:11
Sagan Marketing spunea...

It's a good idea but I agree that the money reward is not worth it... most hackers would be able to see such security bugs for more money than than in other markets... plus those of us who would be willing to invest time into finding such bugs would need a bigger reward than $500 with a chance of $3k... maybe if they did $3k with a chance of $10k... we live in a world where those of us with skills value our time very much... still I'll be on the lookout for anything I can spot indirectly...

13 februarie 2012 la 01:30
Anonim spunea...

Why do I have to have a cellphone?I've been asked for a mobile number again when I made it clear days ago I don't have a cellphone.

I was instead provided with a verification e-mail.

I can barely get the hang of the newer ones and I have trouble with using text on cellphones.

23 mai 2012 la 10:38
Unknown spunea...

Hi.

What about Android platform? It's in the program or it isn't?

14 mai 2013 la 10:26

Trimiteți un comentariu

  

Etichete


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2024
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2023
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2022
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2021
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2020
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2019
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2018
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2017
    • dec.
    • nov.
    • oct.
    • sept.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2016
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2015
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2014
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • apr.
    • mar.
    • feb.
    • ian.
  •     2013
    • dec.
    • nov.
    • oct.
    • aug.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2012
    • dec.
    • sept.
    • aug.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2011
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
  •     2010
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • mai
    • apr.
    • mar.
  •     2009
    • nov.
    • oct.
    • aug.
    • iul.
    • iun.
    • mar.
  •     2008
    • dec.
    • nov.
    • oct.
    • aug.
    • iul.
    • mai
    • feb.
  •     2007
    • nov.
    • oct.
    • sept.
    • iul.
    • iun.
    • mai

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms