• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
Google’s open-source bug bounty aims to clamp down on supply chain attacks

Google’s open-source bug bounty aims to clamp down on supply chain attacks

August 30, 2022
Video Shows Chinese Balloon Being Shot Down Over Atlantic Ocean

Video Shows Chinese Balloon Being Shot Down Over Atlantic Ocean

February 4, 2023
Guy Fieri Lights Sally Field on Fire in Ridiculous ‘80 for Brady’

Guy Fieri Lights Sally Field on Fire in Ridiculous ‘80 for Brady’

February 4, 2023
Former Stable Girl Claims to Be the ‘Older’ Woman Who Took Prince Harry’s Virginity

Former Stable Girl Claims to Be the ‘Older’ Woman Who Took Prince Harry’s Virginity

February 4, 2023
Taylor Lautner Copped To Finding Jacob “Annoying” In ‘Twilight’

Taylor Lautner Copped To Finding Jacob “Annoying” In ‘Twilight’

February 4, 2023
Brutal Cold Seizes Northeast U.S., Shattering Record Lows

Brutal Cold Seizes Northeast U.S., Shattering Record Lows

February 4, 2023
Controversial former NBA player says Colin Kaepernick had ‘most freedom’ he ever felt after anthem protests

Controversial former NBA player says Colin Kaepernick had ‘most freedom’ he ever felt after anthem protests

February 4, 2023
Reese Witherspoon Says “There Is No ‘Legally Blonde 3’ Without Jennifer Coolidge”

Reese Witherspoon Says “There Is No ‘Legally Blonde 3’ Without Jennifer Coolidge”

February 4, 2023
Black fraternity Omega Psi Phi boots cops involved in Tyre Nichols’ death

Black fraternity Omega Psi Phi boots cops involved in Tyre Nichols’ death

February 4, 2023
Videos of Chinese Spy Balloon Being Shot Down Go Viral

Videos of Chinese Spy Balloon Being Shot Down Go Viral

February 4, 2023
Man Accused of Firing Blank Rounds Inside a Synagogue, Police Say

Man Accused of Firing Blank Rounds Inside a Synagogue, Police Say

February 4, 2023
Scientists to engineer woolly mammoth’s return by 2027

Scientists to engineer woolly mammoth’s return by 2027

February 4, 2023
Paul McCartney’s Decade-Long Creative Surge Post-Beatles To Be Explored In ‘Man On The Run’ From Oscar Winner Morgan Neville

Paul McCartney’s Decade-Long Creative Surge Post-Beatles To Be Explored In ‘Man On The Run’ From Oscar Winner Morgan Neville

February 4, 2023
DNYUZ
  • Home
  • News
    • U.S.
    • World
    • Politics
    • Opinion
    • Business
    • Crime
    • Education
    • Environment
    • Science
  • Entertainment
    • Culture
    • Music
    • Movie
    • Television
    • Theater
    • Gaming
    • Sports
  • Tech
    • Apps
    • Autos
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Arts
    • Fashion
    • Food
    • Health
    • Travel
No Result
View All Result
DNYUZ
No Result
View All Result
Home News

Google’s open-source bug bounty aims to clamp down on supply chain attacks

August 30, 2022
in News, Tech
Google’s open-source bug bounty aims to clamp down on supply chain attacks
653
SHARES
1.9k
VIEWS
Share on FacebookShare on Twitter

Google has introduced a new vulnerability rewards program to pay researchers who find security flaws in its open-source software or in the building blocks that its software is built on. It’ll pay anywhere from $101 to $31,337 for information about bugs in projects like Angular, GoLang, and Fuchsia or for vulnerabilities in the third-party dependencies that are included in those projects’ codebases.

While it’s important for Google to fix bugs in its own projects (and in the software that it uses to keep track of changes to its code, which the program also covers), perhaps the most interesting part is the bit about third-party dependencies. Programmers often use code from open-source projects so they don’t continuously have to reinvent the same wheel. But since developers often directly import that code, as well as any updates to it, that introduces the possibility of supply chain attacks. That’s when hackers don’t target the code directly controlled by Google itself but go after these third-party dependencies instead.

As SolarWinds showed, this type of attack isn’t limited to open-source projects. But in the past few years, we’ve seen several stories where big companies have had their security put at risk thanks to dependencies. There are ways to mitigate this sort of attack vector — Google itself has begun vetting and distributing a subset of popular open-source programs, but it’s almost impossible to check over all the code a project uses. Incentivizing the community to check through dependencies and first-party code helps Google cast a wider net.

According to Google’s rules, payouts from the Open Source Software Vulnerability Rewards Program will depend on the severity of the bug, as well as the importance of the project it was found in (Fuchsia and the like are considered “flagship” projects and thus have the biggest payouts). There are also some additional rules around bounties for supply chain vulnerabilities — researchers will have to inform whoever’s actually in charge of the third-party project first before telling Google. They also have to prove that the issue affects Google’s project; if there’s a bug in a part of the library the company’s not using, it won’t be eligible for the program.

Google also says that it doesn’t want people poking around at third-party services or platforms it uses for its open-source projects. If you find an issue with how its GitHub repository is configured, that’s fine; if you find an issue with GitHub’s login system, that’s not covered. (Google says it can’t authorize people to “conduct security research of assets that belong to other users and companies on their behalf.”)

For researchers who aren’t motivated by money, Google offers to donate their rewards to a charity picked by the researcher — the company even says it’ll double those donations.

Obviously, this isn’t Google’s first crack at a bug bounty — it had some form of vulnerability reward program for over a decade. But it’s good to see that the company’s taking action on a problem that it’s been raising the alarm about. Earlier this year, in the wake of the Log4Shell exploit found in the popular open-source Log4j library, Google said the US government needs to be more involved in finding and dealing with security issues in critical open-source projects. Since then, as BleepingComputer notes, the company has temporarily bumped up payouts for people who find bugs in certain open-source projects like Kubernetes and the Linux kernel.

The post Google’s open-source bug bounty aims to clamp down on supply chain attacks appeared first on The Verge.

Tags: CybersecurityGoogleTech
Share261Tweet163Share

Trending Posts

Schools being renamed in campaign to remove ‘dead, white British guys’

Schools being renamed in campaign to remove ‘dead, white British guys’

February 4, 2023
Bill Gates tells Elon Musk that he should forget about space travel and focus on vaccines

Bill Gates tells Elon Musk that he should forget about space travel and focus on vaccines

February 4, 2023
Ashton Kutcher shares embarrassing karaoke story involving Harry Styles

Ashton Kutcher shares embarrassing karaoke story involving Harry Styles

February 4, 2023
House Committee demands docs from Biden aide Kathy Chung in classified probe

House Committee demands docs from Biden aide Kathy Chung in classified probe

February 4, 2023
Bryan Kohberger’s ‘Lovesick’ Fan Calls Alleged Killer ‘Divine Masculine’

Bryan Kohberger’s ‘Lovesick’ Fan Calls Alleged Killer ‘Divine Masculine’

February 4, 2023

Copyright © 2023.

Site Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • U.S.
    • World
    • Politics
    • Opinion
    • Business
    • Crime
    • Education
    • Environment
    • Science
  • Entertainment
    • Culture
    • Gaming
    • Music
    • Movie
    • Sports
    • Television
    • Theater
  • Tech
    • Apps
    • Autos
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Arts
    • Fashion
    • Food
    • Health
    • Travel

Copyright © 2023.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT