Facebook to start paying security bug bounties

Filed Under: Facebook, Google, Law & order, Social networks, Vulnerability

Just over two years ago, a triumvirate of security researchers - Charlie Miller, Alex Sotirov, and Dino Dai Zovi - announced what they hoped would become an internet meme: "No more free bugs."

Their argument was that non-aligned security researchers who find security-related bugs ought to be paid for disclosing them to the relevant vendor. No money, no report.

You can also argue that vendors, especially of web-based services, who offer to pay a reasonable fee for bugs - and why limit bug-finding just to security flaws? - are more likely to attract the goodwill and bug-hunting skills of independent researchers and observant home users. By doing so, they will therefore end up with better-quality products and services than those vendors who don't.

(Computer science luminary, high priest of the analysis of algorithms, pipe-organ buff, funky Biblical scholar and all-round Good Guy, Donald Knuth - you've either heard of him or are about to go and read up about him - famously pays a bounty for any and all errors, no matter how small, found in his publications.

Spelling mistakes, factual errors, historical inaccuracies, incorrect index entries: all qualify for a reward of at least $2.56. That's 100 hexadecimal cents.)

Facebook is the most recent company to come to the bug-bounty party, officially announcing recently that "to show our appreciation for our security researchers, we offer a monetary bounty for certain qualifying security bugs."

There's been general approval of this step, though a few observers have claimed that Facebook's bounty is a bit on the cheap side. Google, say the Facebook detractors, offers US$3113.70 for bugs, and Mozilla US$3000, compared to Facebook's typical starting bounty of US$500.

In fact, the detractors are wrong. Google's offer to start paying for for web application bugs explicitly opens the bidding, just like Facebook, at US$500.

Google's Chromium bug bounty also started at US$500, a figure Google says it copied from Mozilla. The higher figures are for more serious bugs - something Facebook also says it will pay extra for.

So Facebook has definitely taken a step in the right direction here, and its "budget price" for bugs matches what other industry giants are offering. Nice one, Facebook.

Are there any downsides?

The bad news is that Facebook is only interested in security reports to do with explicit web coding flaws, such as XSS (cross-site scripting) bugs or code injection faults. Bugs or shortcomings in the company's general attitude to security don't count.

Sadly, that means you can't grab yourself a quick $1500 by simply sending in Naked Security's Three Simple Steps To Better Facebook Security from our open letter earlier in the year. If you missed them back then, they were:

* Privacy by default.
* Vetted application developers.
* HTTPS for everything.

In fact, Facebook won't pay for bugs in third-party applications at all, even though those applications carry an implicit endorsement by knitting themselves into the fabric of Facebook itself, and even though Facebook still doesn't have a decent application vetting process.

That's a pity.

So too is the verbiage in Facebook's Responsible Disclosure Policy. You might expect that this would merely limit bug payouts to people who give Facebook time to fix the bugs before they announce them to the world.

It does, but also adds the following:

If you give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research, we will not bring any lawsuit against you or ask law enforcement to investigate you.

To me, this wording comes across as pretty scary stuff. Facebook, if you want to draw attention to the threat of lawsuits and of calling the cops, why not stick to doing so against the huge number of scammers who already plague your social network?

Please don't write what sounds eerily close to a threat to the very security researchers you want to get working on your behalf!

, , , , , , , , , ,

You might like

3 Responses to Facebook to start paying security bug bounties

  1. guest · 1096 days ago

    I like your last sentence the best, but agree with you overall.

    Have you ever tried to contact those people? They do NOT make it easy! I used to send them messages to help manage friend's accounts when they were hacked. I sent them several other things in the past where they had problems....when I could easily FIND how to contact them.

    It's been a while now since I tried to contact Facebook, as after a while I gave up. They made it so hard to send them legit problems that I started sending things to you guys.

    I assume though, that I was not the first or something, because, unlike Facebook I can figure out how to send you guys an e-mail, but have seldom seen an acknowledgment of receipt let alone a "thank you". Oh well ....I'll just "shut up and color".

  2. Guest A · 1096 days ago

    I know exactly what you mean when refferencing the difficulties in contacting facebook! Thet dont seem to want you to contact them FULL STOP! We have several nuisance profiles disrupting, insulting and stealing from 'open' profiles. We can report it to third parties but all they can do is delete an offending profile on their site. However, these offenders can and do, easily make a new profile to use for the same purpose! Since the platform is facebook's, facebook needs to get on this. A 'Hidden from public search' profile cannot be reported no matter how much mayhem they are causing! You simply cannot report it to facebook. NOT a very satisfactory state of affairs in anyone's book!

  3. Carl · 1096 days ago

    Do you have a link to report bugs to Facebook?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Paul Ducklin is a passionate security proselytiser. (That's like an evangelist, but more so!) He lives and breathes computer security, and would be happy for you to do so, too. Paul won the inaugural AusCERT Director's Award for Individual Excellence in Computer Security in 2009. Follow him on Twitter: @duckblog