Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Public Bug Bounty Program Launched for Kubernetes

The Cloud Native Computing Foundation (CNCF) this week announced the launch of a public bug bounty program for Kubernetes, with rewards of up to $10,000 per vulnerability.

The Cloud Native Computing Foundation (CNCF) this week announced the launch of a public bug bounty program for Kubernetes, with rewards of up to $10,000 per vulnerability.

Kubernetes is an open-source system designed for automating deployment, scaling and management of containerized applications. It was originally developed by Google and it’s now maintained by the CNCF.

The new bug bounty program is hosted by HackerOne and CNCF says it will do its best to respond to submitted reports within one business day, triage vulnerabilities within 10 days, and pay out a bounty within 10 days from triage.

Bounties range between $100 and $10,000, with the highest rewards being offered for vulnerabilities affecting the Kubernetes core, flaws that can be exploited to alter source code, and DoS attacks on release artifacts.

The highest amount CNCF is willing to pay for vulnerabilities affecting non-core components is $5,000. For weaknesses affecting Kubernetes infrastructure or alpha features in the core, the organization will pay up to $2,500.

There is a long list of components that can be targeted and types of vulnerabilities CNCF is looking for. Some types of issues are in scope of the program, but they are currently not eligible for a bounty.

According to CNCF, the bug bounty program is managed by the Kubernetes Product Security Committee, whose members include representatives of Google, Red Hat and Shopify.

Advertisement. Scroll to continue reading.

The launch of the bug bounty project comes just months after the completion of a security audit that led to the discovery of some critical vulnerabilities.

Related: Apple Kicks Off Public Bug Bounty Program

Related: NordVPN Launches Bug Bounty Program

Related: LINE Launches Public Bug Bounty Program on HackerOne

Related: Bug Bounty Program Launched for Facebook’s Libra Cryptocurrency

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.

Register

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.