iTnews Asia
  • Home
  • News
  • Security

Google attracting bounty hunters to open source projects

Google attracting bounty hunters to open source projects

Better security for products like Golang.

By Richard Chirgwin on Sep 1, 2022 12:06PM

Google has added a bug bounty programme focused on its open source projects.

The company’s open source projects include well-known software like the Go language, Angular web developer environment, and Fuchsia operating system, with confirmed bugs to earn their discoverers between US$100 (S$140) and US$31,337 (a hat-tip to calculator-speak for ‘eleet’).

Other high-profile projects currently in scope for the bounty include the Bazel build system, and Protocol Buffers used to serialise structured data.

“After the initial rollout we plan to expand this list," Google’s open source security technical program manager Francis Perron and information security engineer Krzysztof Kotowicz wrote.

The pair said the main interests of the programme as it now stands are “vulnerabilities that lead to supply chain compromise, design issues that cause product vulnerabilities, and other security issues such as sensitive or leaked credentials, weak passwords, or insecure installations”.

“Supply chain compromise” covers “the ability to compromise Google OSS source code, and build artefacts or packages distributed via package managers to users.”

Product vulnerabilities are straightforward issues like memory corruption, sanitisation failure, path traversal, bad defaults, or even insecure code examples in the documentation.

There are other classes of bugs that will be recognised: sensitive credentials, weak passwords in third-party products, or install and usage instructions “that compromise the security of the developers working on the product”.

Google recognises the dependencies that underpin open source projects, so it makes third-party vulnerabilities explicitly within the scope of the program.

So long as a researcher notifies the maintainer of the third-party package, Google will accept a vulnerability if it can be triggered or exploited in a Google open source package; and is shared no earlier than 30 days after the upstream fix is available.

Third-party “services or platforms”, however, are out of scope.

There are three project tiers covering flagship projects (Bazel, Angular, Golang, Protocol buffers and Fuscia); standard OSS projects; and low-priority OSS projects (these may be experimental, samples, small, or low-activity projects).

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
angular bazel bug bounty cyber security fuscia golang google security software vulnerability

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.