Wednesday, August 31, 2022
HomeHackerGoogle Introduces Bug Bounty Program for Open-Supply Software program

Google Introduces Bug Bounty Program for Open-Supply Software program


Google has launched its Open Supply Software program Vulnerability Rewards Program (OSS VRP), the place researchers will discover bugs and vulnerabilities within the open-source software program ecosystem. Google is providing rewards of round $31,337 to those that detect bugs.

Google has employed a crowdsourced method to safety with a particular give attention to mitigating vulnerabilities within the under-funded and under-maintained however extensively used open-source initiatives.

By means of this rewards program, the corporate goals to eradicate invasion factors and assist enterprises perform securely because the open-source ecosystem wants huge safety overhauling.

It’s value noting that numerous organizations depend on open-source software program to carry out vital operations. But, they train little to no management over these parts, making the state of affairs dangerous for these organizations.

Moreover, assaults on the software program provide chain have spiked through the years. They’re at present at an all-time excessive after 0-day vulnerabilities Log4j and Log4Shell have been found, and devastating knowledge breaches befell, together with SolarWinds.

By means of OSS VRP, moral hackers will get rewards starting from $100 – $31,337, relying on their found bug’s severity. The very best rewards shall be provided to bugs present in delicate open-source initiatives like Angular, Bazel, Protocol buffers, Golang, and Fuchsia.

Based on Google’s weblog submit, the occasion will focus primarily on up-to-date variations of open-source initiatives/software program and repository settings saved in GitHub’s public repositories. Among the vulnerabilities Google expects to be detected embrace those who trigger provide chain compromise, product vulnerabilities brought on by design points, weak passwords, leaked credentials, and many others.

  • Vulnerabilities that result in provide chain compromise
  • Design points that trigger product vulnerabilities
  • Different safety points akin to delicate or leaked credentials, weak passwords, or insecure installations

“The bigger quantities will even go to uncommon or notably fascinating vulnerabilities, so creativity is inspired.”

Google

Such applications will restore the arrogance of customers and distributors within the open supply software program provide chain as vulnerabilities shall be well timed recognized and glued. So you probably have what it takes to take part in Google’s newest bug bounty program we want you good luck!

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments