Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Twitter Launches Bug Bounty Program via HackerOne

In an effort to thank researchers who responsibly disclose security vulnerabilities, Twitter has introduced a bug bounty program powered by the HackerOne platform.

In an effort to thank researchers who responsibly disclose security vulnerabilities, Twitter has introduced a bug bounty program powered by the HackerOne platform.

Security experts have already reported tens of Twitter flaws over the past three months via HackerOne, but issues submitted before September 3, 2014 were not eligible for a monetary reward. However, from now on, those who report vulnerabilities on twitter.com and its subdomains, Twitter for Android, and Twitter for iOS will be rewarded with a minimum of $140, the company said.

The good news is that a maximum reward limit has not been set, but Twitter has not revealed if it’s willing to pay as much as other major companies, which often hand out tens of thousands of dollars for a single serious security issue.

“Reward amounts may vary depending upon the severity of the vulnerability reported. Twitter will determine in its discretion whether a reward should be granted and the amount of the reward. This is not a contest or competition. Rewards may be provided on an ongoing basis so long as this program is active,” the social media company said on its HackerOne page.

Researchers will not get any money for reporting vulnerabilities found on other Twitter domains and applications than the ones mentioned before, but they can see their names listed in the company’s “Hall of fame.”

There are four main conditions that must be met by those who submit security holes: they must not be residents of sanctioned countries like Syria or North Korea, they must not publicly disclose their findings before Twitter gets a chance to roll out a patch, they must be the first to find the reported issue, and the reported vulnerability must be one from the list of qualifying vulnerabilities.

Vulnerability types that qualify for the program are cross-site scripting (XSS), cross-site request forgery (CSRF), remote code execution (RCE), unauthorized access to direct messages, and unauthorized access to protected tweets. Researchers are advised to use testing accounts, and refrain from spamming, launching denial-of-service attacks, or performing any other action that negatively impacts other customers.

Twitter points out that reports of spam, social engineering Twitter staff, physical attacks, vulnerabilities that only affect users of outdated software, and unverified reports obtained with automated tools are out of scope.

Additional details on Twitter’s bug bounty program are available on HackerOne.

In May 2014, HackerOne secured $9 million in a Series A round of funding, and appointed Katie Moussouris, former senior security strategist lead at Microsoft, as the company’s chief policy officer.

Podcast: Katie Moussouris on HackerOne and Bug Bounties

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.