Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Google Announces Rewards for Tsunami Security Scanner Plugins

Google this week announced that it is offering monetary payouts to individuals who help expand the detection capabilities of the Tsunami security scanner.

Two types of contributions are currently accepted in the experimental reward program, namely vulnerability detection plugins and web application fingerprints.

Google this week announced that it is offering monetary payouts to individuals who help expand the detection capabilities of the Tsunami security scanner.

Two types of contributions are currently accepted in the experimental reward program, namely vulnerability detection plugins and web application fingerprints.

An open-source general purpose network security scanner, Tsunami is meant to help organizations identify vulnerabilities and misconfigurations in their networks in an automated manner.

Designed as an extensible network scanning engine and easy to implement, the scanner heavily relies on plugins for the discovery of high-severity security bugs, and supports a curated set of vulnerabilities.

New plugins are expected to help Tsunami detect new security issues in scanned networks, and all interested contributors are encouraged to submit their projects.

Submissions will be reviewed by panel members in Google’s Vulnerability Management team and payout amounts will be awarded based on quality, vulnerability severity and time sensitivity. The maximum reward is $3,133.7, for critical vulnerabilities that came to light within the past two weeks.

Google added new web application fingerprinting capabilities to Tsunami only months ago, and is now looking to expand the scanner’s ability to detect off-the-shelf web applications. As more fingerprints are added to its database, the scanner will be able to support more web apps.

A flat $500 reward will be paid for each new application that is added to the database.

Advertisement. Scroll to continue reading.

The new patch reward program, Google says, will run in iterations, to ensure that as many people as possible can participate. Those who choose to do so, may donate their rewards to charity, just as with other reward programs.

Additional information on the Patch Reward Program for the Tsunami project is available on Google’s Bug Hunters website.

Related: Google Helps OSTIF Boost Security of Open Source Projects

Related: Google Paid Over $29 Million in Bug Bounty Rewards in 10 Years

Related: Google Intros SLSA Framework to Enforce Supply Chain Integrity

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.