Twitter launches bug bounty program

The company will pay researchers at least $140 for privately reporting serious vulnerabilities in its Web services and mobile apps

Following in the footsteps of other major Internet companies, Twitter has started paying monetary rewards to security researchers who find and report vulnerabilities in its Web services and mobile apps.

In recent years, bug bounty programs have become a popular complement to internal code security reviews and penetration tests.

Google was one of the first companies to launch a vulnerability reward program that covered its online properties in 2010. It's since been joined by Facebook, PayPal, Yahoo and Mozilla.

"We're introducing a bug bounty program to thank researchers for responsibly-disclosed issues," Twitter said Wednesday through its Twitter Security account.

The company has opted to run its program through a third-party bug reporting platform called HackerOne that's also used by Yahoo, CloudFlare, Automattic and other companies.

HackerOne also runs the Internet Bug Bounty, a program sponsored by Microsoft and Facebook that rewards researchers for finding vulnerabilities in software considered critical to the Internet infrastructure like the OpenSSL library, the Apache and Nginx Web servers and the Ruby, Python, PHP and Perl programming languages.

According to its page on HackerOne, Twitter will pay at least $140 per vulnerability found in its twitter.com services or iOS and Android apps. The reward amounts may vary depending on the severity of the reported flaws and there is no predefined limit to how high they can get, Twitter said.

Vulnerabilities that qualify for bounties under Twitter's program are those that result in cross-site scripting (XSS), cross-site request forgery (CSRF), remote code execution (RCE) or unauthorized access to protected tweets and direct messages.

Even though the official program with monetary rewards just launched, Twitter has been using HackerOne since May, during which time it has patched over 40 bugs reported through the platform. Prior to this, the only public recognition it gave to researchers who directly reported flaws to the company was listing them on its security page.

Bug bounty programs "are a great tool -- if done right -- for companies to control the disclosure process and encourage researchers to come to them with their findings," said Carsten Eiram, the chief research officer at Risk Based Security via email on Thursday. "It's also being used a lot as a PR tool to show that the company cares about security and working with researchers."

Eiram and Risk Based Security CISO Jake Kouns held a presentation about the evolution of bug bounty programs and how they motivate researchers at the DefCon security conference in August.

"I generally recommend most major companies with a SaaS [software-as-a-service] solution to have a bug bounty program in place," Eiram said. "Even smaller companies should consider it, and there are a lot of different options available, fitting the various sizes of companies and their wallets. Using platforms like HackerOne, Bugcrowd, or CrowdCurity can make the whole process easier to manage vs. creating one's own program from scratch."

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags patchesonline safetysecuritytwitterExploits / vulnerabilities

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?