• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Oppo Find N5 review: Stellar foldable has one big problem

July 30, 2025

The Naked Gun review: Charged with man’s laughter

July 30, 2025

Samsung Galaxy Tab S10 FE+ review: A Galaxy Tab S10+ for less?

July 30, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»Google’s open-source bug bounty aims to clamp down on supply chain attacks
Security

Google’s open-source bug bounty aims to clamp down on supply chain attacks

August 30, 2022No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Don’t wait to install the June Windows update — it fixes the Follina security flaw
Share
Facebook Twitter LinkedIn Pinterest Email

Google has introduced a new vulnerability rewards program to pay researchers who discover safety flaws in its open-source software program or within the constructing blocks that its software program is constructed on. It’ll pay wherever from $101 to $31,337 for details about bugs in tasks like Angular, GoLang, and Fuchsia or for vulnerabilities within the third-party dependencies which can be included in these tasks’ codebases.

Whereas it’s essential for Google to repair bugs in its personal tasks (and within the software program that it makes use of to maintain observe of modifications to its code, which this system additionally covers), maybe essentially the most attention-grabbing half is the bit about third-party dependencies. Programmers typically use code from open-source tasks in order that they don’t constantly must reinvent the identical wheel. However since builders typically instantly import that code, in addition to any updates to it, that introduces the potential for provide chain assaults. That’s when hackers don’t goal the code instantly managed by Google itself however go after these third-party dependencies as an alternative.

Open-source libraries can typically be used as a computer virus into greater tasks

As SolarWinds confirmed, the sort of assault isn’t restricted to open-source tasks. However up to now few years, we’ve seen a number of tales the place large corporations have had their safety put in danger due to dependencies. There are methods to mitigate this form of assault vector — Google itself has begun vetting and distributing a subset of well-liked open-source packages, nevertheless it’s nearly unimaginable to verify over all of the code a mission makes use of. Incentivizing the neighborhood to verify by dependencies and first-party code helps Google forged a wider web.

See also  Retail software firm PrestaShop warns users about SQL injection attacks

Based on Google’s rules, payouts from the Open Supply Software program Vulnerability Rewards Program will depend upon the severity of the bug, in addition to the significance of the mission it was present in (Fuchsia and the like are thought of “flagship” tasks and thus have the largest payouts). There are additionally some further guidelines round bounties for provide chain vulnerabilities — researchers should inform whoever’s really in control of the third-party mission first earlier than telling Google. Additionally they must show that the difficulty impacts Google’s mission; if there’s a bug in part of the library the corporate’s not utilizing, it received’t be eligible for this system.

“Researchers can now be rewarded for locating bugs that would probably impression all the open supply ecosystem.”

Google additionally says that it doesn’t need folks poking round at third-party companies or platforms it makes use of for its open-source tasks. In case you discover a difficulty with how its GitHub repository is configured, that’s fantastic; if you happen to discover a difficulty with GitHub’s login system, that’s not lined. (Google says it could possibly’t authorize folks to “conduct safety analysis of property that belong to different customers and firms on their behalf.”)

For researchers who aren’t motivated by cash, Google affords to donate their rewards to a charity picked by the researcher — the corporate even says it’ll double these donations.

Clearly, this isn’t Google’s first crack at a bug bounty — it had some type of vulnerability reward program for over a decade. However it’s good to see that the corporate’s taking motion on an issue that it’s been elevating the alarm about. Earlier this yr, within the wake of the Log4Shell exploit discovered within the well-liked open-source Log4j library, Google mentioned the US authorities must be extra concerned to find and coping with safety points in crucial open-source tasks. Since then, as BleepingComputer notes, the corporate has temporarily bumped up payouts for individuals who discover bugs in sure open-source tasks like Kubernetes and the Linux kernel.

See also  Ex-CIA engineer Joshua Schulte convicted over massive ‘Vault 7’ leak in 2017



Source link

aims attacks bounty bug chain clamp Googles opensource Supply
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Still on Big Sur? Google’s Chrome Is Moving On

July 16, 2025

Apple Alerts Journalists and Activists to Mercenary Spyware Attacks

May 1, 2025

Bug in macOS and iOS updates re-enables Apple Intelligence for some refuseniks

February 11, 2025

Apple refused to pay bounty to Kaspersky for uncovering vulnerability in ‘Operation Triangulation’

June 9, 2024
Add A Comment

Comments are closed.

Editors Picks

How To Increase Traffic To Your Website

November 12, 2022

Spotify quietly discontinues Car Thing dashboard accessory

July 27, 2022

3 Critical Elements Of Effective Insider Risk Management

July 17, 2022

Dutch cyber security organisations to join forces

September 8, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Oppo Find N5 review: Stellar foldable has one big problem

The Naked Gun review: Charged with man’s laughter

Samsung Galaxy Tab S10 FE+ review: A Galaxy Tab S10+ for less?

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.