Google will pay you $1000 to find bugs in most popular Android's apps.

Google is partnering with bug bounty service HackerOne for the project, which it calls the Google Play Security Reward Program. The worldwide program currently only applies to eight popular apps such as Duolingo, Snapchat, Tinder, Headspace and Alibaba, although Google's own suite of apps for Android qualify as well.
Apps currently only qualify for inclusion in the program if their developers get an invitation from Google, but in time the Mountain View, California company plans to roll out the service on an opt-in basis.
Bug out
Nor do all bugs qualify. At the moment, Google is only interested in finding flaws that enable remote code executions (RCEs) on Android 4.4 and above. In essence, that means it's looking for bugs that allow web pages to open in an app for the purpose of phishing, or flaws that allowed the download of malicious code and the possible infection of an Android device with a virus.
It's a not-so-subtle way of forcing Android app developers to get their acts together. You're not even supposed to contact Google if you find a bug; instead, you contact the developer of the app through a form provided by HackerOne, and then the developer contacts Google once it's released a patch for the bug. Only then will you see any cash.
Google already offers similar bounties for Chromebooks and Android proper, but this marks the first time that it's extended the service to developers who use its popular operating system.
For anyone keen on tackling Google’s new software challenge, payments of $1,000 will be made for each verified software vulnerability.
The vulnerability criteria is laid out below:
For now, the scope of this program is limited to RCE (remote-code-execution) vulnerabilities and corresponding POCs (Proof of concepts) that work on Android 4.4 devices and higher.
This translates to any RCE vulnerability that allows an attacker to run code of their choosing on a user’s device without user knowledge or permission. Examples may include:
Attacker gaining full control, meaning code can be downloaded from the network and executed (download and execute arbitrary code, native, Java code etc. Javascript)
UI Manipulation to commit a transaction. For example, causing a banking app to make money transfers on behalf of the user without their consent.
Opening of webview that may lead to phishing attacks. Opening webview without user input or interaction.
There is no requirement that OS sandbox needs to be bypassed.
Notably, the new bug bounty program, as it stands now, only applies to Google-developed Android apps and the following third-party apps: Alibaba, Dropbox, Duolingo, Headspace, Line, Mail.Ru, Snapchat, and Tinder. Down the line, though, the program may open up to include additional third-party apps.
Comments
Post a Comment