Saying Google’s Open Supply Software program Vulnerability Rewards Program

0
132
Saying Google’s Open Supply Software program Vulnerability Rewards Program


As we speak, we’re launching Google’s Open Supply Software program Vulnerability Rewards Program (OSS VRP) to reward discoveries of vulnerabilities in Google’s open supply tasks. Because the maintainer of main tasks reminiscent of Golang, Angular, and Fuchsia, Google is among the many largest contributors and customers of open supply on the earth. With the addition of Google’s OSS VRP to our household of Vulnerability Reward Packages (VRPs), researchers can now be rewarded for locating bugs that might probably affect all the open supply ecosystem.

Google has been dedicated to supporting safety researchers and bug hunters for over a decade. The unique VRP program, established to compensate and thank those that assist make Google’s code safer, was one of many first on the earth and is now approaching its twelfth anniversary. Over time, our VRP lineup has expanded to incorporate packages centered on Chrome, Android, and different areas. Collectively, these packages have rewarded greater than 13,000 submissions, totaling over $38M paid. 

The addition of this new program addresses the ever extra prevalent actuality of rising provide chain compromises. Final 12 months noticed a 650% year-over-year improve in assaults focusing on the open supply provide chain, together with headliner incidents like Codecov and the Log4j vulnerability that confirmed the harmful potential of a single open supply vulnerability. Google’s OSS VRP is a part of our $10B dedication to enhancing cybersecurity, together with securing the provision chain towards a majority of these assaults for each Google’s customers and open supply shoppers worldwide.

Tasks

Google’s OSS VRP encourages researchers to report vulnerabilities with the best actual, and potential, affect on open supply software program beneath the Google portfolio. This system focuses on:

The highest awards will go to vulnerabilities present in essentially the most delicate tasks: Bazel, Angular, Golang, Protocol buffers, and Fuchsia. After the preliminary rollout we plan to increase this record. Make sure you examine again to see what’s been added.

Vulnerabilities 

To focus efforts on discoveries which have the best affect on the provision chain, we welcome submissions of:

Relying on the severity of the vulnerability and the undertaking’s significance, rewards will vary from $100 to $31,337. The larger quantities may also go to uncommon or significantly fascinating vulnerabilities, so creativity is inspired.

Earlier than you begin, please see the program guidelines for extra details about out-of-scope tasks and vulnerabilities, then get hacking and tell us what you discover. In case your submission is explicitly uncommon, we’ll attain out and work with you instantly for triaging and response. Along with a reward, you may obtain public recognition in your contribution. It’s also possible to decide to donate your reward to charity at double the unique quantity.

Undecided whether or not a bug you’ve discovered is true for Google’s OSS VRP? Don’t fear, if wanted, we’ll route your submission to a special VRP that offers you the best potential payout. We additionally encourage you to take a look at our Patch Rewards program, which rewards safety enhancements to Google’s open supply tasks (for instance, as much as $20K for fuzzing integrations in OSS-Fuzz).

 

Google is proud to each assist and be part of the open supply software program group. Via our present bug bounty packages, we’ve rewarded bug hunters from over 84 international locations and sit up for growing that quantity via this new VRP. The group has constantly stunned us with its creativity and willpower, and we can not wait to see what new bugs and discoveries you could have in retailer. Collectively, we may also help enhance the safety of the open supply ecosystem. 

Give it a strive, and completely happy bug looking! 

LEAVE A REPLY

Please enter your comment!
Please enter your name here