Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks

Accepted submission by upstart at 2022-08-31 17:35:30
News

████ # This file was generated bot-o-matically! Edit at your own risk. ████

go-get-those-money

Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks [thehackernews.com]:

Google on Monday introduced a new bug bounty program for its open source projects, offering payouts anywhere from $100 to $31,337 (a reference to eleet or leet [wikipedia.org]) to secure the ecosystem from supply chain attacks [thehackernews.com].

Called the Open Source Software Vulnerability Rewards Program (OSS VRP), the offering is one of the first open source-specific vulnerability programs.

With the tech giant the maintainer of major projects such as Angular, Bazel, Golang, Protocol Buffers, and Fuchsia, the program aims to reward vulnerability discoveries that could otherwise have a significant impact on the larger open source landscape.

Other projects managed by Google and hosted on public repositories such as GitHub as well as the third-party dependencies that are included in those projects are also eligible.

Submissions [google.com] from bug hunters are expected to meet the following criteria -

  • Vulnerabilities that lead to supply chain compromise
  • Design issues that cause product vulnerabilities
  • Other security issues such as sensitive or leaked credentials, weak passwords, or insecure installations

Beefing up open source components, especially third-party libraries that act as the building block of many a software, has emerged a top priority in the wake of steady escalation in supply chain attacks targeting Maven, NPM, PyPI, and RubyGems.

The Log4Shell vulnerability [thehackernews.com] in the Log4j Java logging library that came to light in December 2021 is a prime example, causing widespread havoc and becoming a clarion call for improving the state of the software supply chain.

"Last year saw a 650% year-over-year increase [sonatype.com] in attacks targeting the open source supply chain, including headliner incidents like Codecov [thehackernews.com] and the Log4j vulnerability that showed the destructive potential of a single open source vulnerability," Google's Francis Perron and Krzysztof Kotowicz said [googleblog.com].

The move follows a similar rewards program Google instituted last November [thehackernews.com] for uncovering privilege escalation and Kubernetes escape exploits in the Linux Kernel. It has since upped the maximum amount [googleblog.com] from $50,337 to $91,337 until the end of 2022.

Earlier this May, the internet behemoth announced the creation of a new "Open Source Maintenance Crew [thehackernews.com]" to focus on bolstering the security of critical open source projects.

Found this article interesting? Follow THN on Facebook [facebook.com], Twitter [twitter.com] and LinkedIn [linkedin.com] to read more exclusive content we post.


Original Submission