Security News > 2022 > August > Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks

Google on Monday introduced a new bug bounty program for its open source projects, offering payouts anywhere from $100 to $31,337 to secure the ecosystem from supply chain attacks.
Called the Open Source Software Vulnerability Rewards Program, the offering is one of the first open source-specific vulnerability programs.
With the tech giant the maintainer of major projects such as Angular, Bazel, Golang, Protocol Buffers, and Fuchsia, the program aims to reward vulnerability discoveries that could otherwise have a significant impact on the larger open source landscape.
Beefing up open source components, especially third-party libraries that act as the building block of many a software, has emerged a top priority in the wake of steady escalation in supply chain attacks targeting Maven, NPM, PyPI, and RubyGems.
"Last year saw a 650% year-over-year increase in attacks targeting the open source supply chain, including headliner incidents like Codecov and the Log4j vulnerability that showed the destructive potential of a single open source vulnerability," Google's Francis Perron and Krzysztof Kotowicz said.
Earlier this May, the internet behemoth announced the creation of a new "Open Source Maintenance Crew" to focus on bolstering the security of critical open source projects.
News URL
https://thehackernews.com/2022/08/google-launches-new-open-source-bug.html
Related news
- Open-source malware doubles, data exfiltration attacks dominate (source)
- Recent GitHub supply chain attack traced to leaked SpotBugs token (source)
- SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack (source)
- Google fixes Android zero-days exploited in attacks, 60 other flaws (source)
- That massive GitHub supply chain attack? It all started with a stolen SpotBugs token (source)
- EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher (source)
- Phishers abuse Google OAuth to spoof Google in DKIM replay attack (source)
- Ripple's xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack (source)
- Ripple NPM supply chain attack hunts for private keys (source)
- Google: 97 zero-days exploited in 2024, over 50% in spyware attacks (source)