HILIGHTS
- Google launches open-source software bug bounty program.
- Google will reward security researchers if they report bugs in Google OSS.
- Google set high rewards up to Rs 25 lakh for particularly interesting vulnerabilities.

Google has released a brand new trojan horse bounty software to praise protection researchers in the event that they discover and record insects withinside the contemporary open-supply software program -- Google OSS. The tech massive stated that trojan horse hunters can be provided up to $31,337 (almost Rs 25 lakh) for recognizing vulnerabilities withinside the Open Source projects.
As consistent with the organization, the rewards will range from $a hundred to $31,337 relying at the seriousness of the vulnerability and the importance of the initiative. Google introduced the trojan horse bounty software on the time of launching its Open Source Software Vulnerability Rewards Program (OSS VRP). The tech massive stated that the rewards can be given to uncommon or mainly thrilling vulnerabilities, "so innovation is encouraged" (OSS VRP). "The pinnacle awards will visit vulnerabilities determined withinside the maximum touchy projects: Bazel, Angular, Golang, Protocol buffers, and Fuchsia," it in addition added.
Notably, Google software program and repository settings (like GitHub actions, utility configurations, and get admission to manipulate rules) are the point of interest of the organization's these days released Vulnerability Reward Program (VRP). It extends to software program to be had from public repositories of Google-owned GitHub agencies and a few repositories on different systems as well. The number one cognizance of Google's OSS VRP is the safety problems with the finest capability to have an effect on the software program deliver chain. In order to save you deliver chain vulnerability, product dangers because of layout flaws, and protection flaws like uncovered credentials, vulnerable passwords, or unsecured installations, the organization advises trojan horse bounty hunters to pay attention on those problem.
Google additionally advised individuals to cautiously see this system regulations and
greater records at the project. "Before you start, please see the
application regulations for greater records approximately out-of-scope tasks and
vulnerabilities, then get hacking and allow us to recognize what you find. If your
submission is specifically unusual, we're going to attain out and paintings with you
immediately for triaging and response," the employer stated.
In
addition, the tech massive stated it'll apprehend the programmers and will
thank them formally for his or her contribution. "In addition to a praise,
you may acquire public popularity to your contribution. You can additionally
choose to donate your praise to charity at double the authentic amount," the
employer stated.
Notably, Google nearly doubled its rewards in
February for zero-day vulnerabilities and computer virus exploits that concentrate on the
Linux Kernel, Kubernetes, Google Kubernetes Engine (GKE), or kCTF.