Twitter Has Paid Out $322,420 in Its ‘HackerOne’ Bug Bounty Programme

Micro-blogging website Twitter has paid $322,420 (more or less Rs. 2.1 crores) to researchers and malicious program hunters who, beneath its trojan horse bounty “HackerOne” software, have disclosed vulnerabilities in the closing two years.

“We maintain a secure improvement lifecycle that consists of comfortable improvement schooling to everyone that ships code, security review methods, hardened protection libraries and sturdy testing via inner and outside services – all to maximize the security we provide to our users,” Arkadiy Tetelman, software program engineer at Twitter, stated in a weblog publish on Friday.

On top of those measures, the agency additionally engages the broader facts security community through their bug bounty application, permitting security researchers to responsibly expose vulnerabilities to the company that will can reply and address those problems before they’re exploited by using others.

The company has been utilizing “HackerOne” seeing that might also 2014 and has located the program to be a useful resource for locating and solving security vulnerabilities ranging from the mundane to extreme, Tetelman brought.

He noted that during two years, the organisation has obtained five,171 submissions to the program from 1,662 researchers and 20 percent of resolved insects had been publicly disclosed (on the request of the researcher).

“we’ve paid out a total of $322,420 (USD) to researchers. Our average payout is $835. Our minimum payout is $one hundred forty and our highest payout to date turned into $12,040 (our payouts are constantly a a couple of of one hundred forty),” Tetelman mentioned.

In 2015 on my own, a unmarried researcher made over $54,000 (roughly Rs. 36 lakhs) for reporting vulnerabilities, the software engineer stated.

“We also offer at least $15,000 (more or less Rs. 10 lakhs) for faraway code execution vulnerabilities, but we’ve got but to get hold of the sort of record,” he delivered.

Tetelman cited some outstanding bugs uncovered through this system, along with XSS inner Crashlytics Android app that renders a part of its content material inner a webview, which did not have adequate protection against move website scripting assaults.

He additionally cited “IDOR permitting credit score card deletion” — a easy insecure direct object reference trojan horse on the credit score card deletion endpoint allowed an attacker to delete, however now not view, credit playing cards now not belonging to them.

“in case you are inquisitive about supporting hold Twitter safe and cozy too then head on over to our computer virus bounty application, or practice to certainly one of our open safety positions!” he said.

Leave a Reply

Your email address will not be published. Required fields are marked *