Skip to main content

The Rules of Engagement for Bug Bounty Programs

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10957))

Included in the following conference series:

Abstract

White hat hackers, also called ethical hackers, who find and report vulnerabilities to bug bounty programs have become a significant part of today’s security ecosystem. While the efforts of white hats contribute to heightened levels of security at the participating organizations, the white hats’ participation needs to be carefully managed to balance risks with anticipated benefits. One way, taken by organizations, to manage bug bounty programs is to create rules that aim to regulate the behavior of white hats, but also bind these organizations to certain actions (e.g., level of bounty payments). To the best of our knowledge, no research exists that studies the content of these program rules and their impact on the effectiveness of bug bounty programs.

We collected and analyzed the rules of 111 bounty programs on a major bug bounty platform, HackerOne. We qualitatively study the contents of these rules to determine a taxonomy of statements governing the expected behavior of white hats and organizations. We also report specific examples of rules to illustrate their reach and diversity across programs. We further engage in a quantitative analysis by pairing the findings of the analysis of the program rules with a second dataset about the performance of the same bug bounty programs, and conducting statistical analyses to evaluate the impact of program rules on program outcomes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We used the Python difflib implementation of the Ratcliff/Obershelp matching algorithm [20] with parameter 0.9.

  2. 2.

    HackerOne’s Privacy Policy (https://www.hackerone.com/privacy/) states as a general policy that “we welcome minors to submit reports to HackerOne.” However, the site is not directed at minors below 13 who would need to have their parents/guardians submit vulnerability reports and to set up an account.

  3. 3.

    HackerOne’s Vulnerability Disclosure Guidelines (https://www.hackerone.com/ disclosure-guidelines/).

  4. 4.

    Since not all programs disclose their average bounty, we have to restrict our analysis to 58 data points in this subsection.

  5. 5.

    A lower value of Alexa rank represents a more popular website. For example, an Alexa rank of 1 indicates the most-visited website.

  6. 6.

    Note that we use data from the entire history of each bug bounty program. We have also tested the models using only data available after the last major rule update of each program. The regression analysis shows the same directionality of effects, but the dataset is much smaller to report a robust analysis.

References

  1. Algarni, A., Malaiya, Y.: Software vulnerability markets: discoverers and buyers. Int. J. Comput. Inf. Sci. Eng. 8(3), 71–81 (2014)

    Google Scholar 

  2. Bacon, D., Chen, Y., Parkes, D., Rao, M.: A market-based approach to software evolution. In: 24th ACM SIGPLAN Conference Companion on Object Oriented Programming, Systems, Languages, and Applications (2009)

    Google Scholar 

  3. Böhme, R.: A comparison of market approaches to software vulnerability disclosure. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 298–311. Springer, Heidelberg (2006). https://doi.org/10.1007/11766155_21

    Chapter  Google Scholar 

  4. Bozorgi, M., Saul, L., Savage, S., Voelker, G.: Beyond heuristics: learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 105–114 (2010)

    Google Scholar 

  5. Bugcrowd: The state of Bug Bounty, July 2015

    Google Scholar 

  6. Bugcrowd: The state of Bug Bounty, June 2016

    Google Scholar 

  7. Clark, S., Frei, S., Blaze, M., Smith, J.: Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities. In: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), pp. 251–260 (2010)

    Google Scholar 

  8. Edmundson, A., Holtkamp, B., Rivera, E., Finifter, M., Mettler, A., Wagner, D.: An empirical study on the effectiveness of security code review. In: Jürjens, J., Livshits, B., Scandariato, R. (eds.) ESSoS 2013. LNCS, vol. 7781, pp. 197–212. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36563-8_14

    Chapter  Google Scholar 

  9. Finifter, M., Akhawe, D., Wagner, D.: An empirical study of vulnerability rewards programs. In: USENIX Security Symposium (2013)

    Google Scholar 

  10. Flesch, R.: A new readability yardstick. J. Appl. Psychol. 1948(32), 221–233 (1948)

    Article  Google Scholar 

  11. Huang, K., Siegel, M., Madnick, S., Li, X., Feng, Z.: Poster: diversity or concentration? Hackers’ strategy for working across multiple bug bounty programs. In: 37th IEEE Symposium on Security and Privacy (S&P) (2016)

    Google Scholar 

  12. Kuehn, A., Mueller, M.: Analyzing bug bounty programs: an institutional perspective on the economics of software vulnerabilities. In: TPRC Conference Paper (2014)

    Google Scholar 

  13. Laszka, A., Zhao, M., Grossklags, J.: Banishing misaligned incentives for validating reports in bug-bounty platforms. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 161–178. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45741-3_9

    Chapter  Google Scholar 

  14. Laszka, A., Zhao, M., Grossklags, J.: Devising effective economic policies for bug-bounty platforms and security vulnerability discovery. J. Inf. Policy 7, 372–418 (2017)

    Article  Google Scholar 

  15. Maillart, T., Zhao, M., Grossklags, J., Chuang, J.: Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty markets. J. Cybersecur. 3, 81–90 (2017)

    Article  Google Scholar 

  16. Mc Laughlin, H.: SMOG grading - a new readability formula. J. Reading 12(8), 639–646 (1969)

    Google Scholar 

  17. Ozment, A.: The likelihood of vulnerability rediscovery and the social utility of vulnerability hunting. In: Workshop on the Economics of Information Security (WEIS) (2005)

    Google Scholar 

  18. Ozment, A., Schechter, S.: Milk or wine: does software security improve with age? In: USENIX Security Symposium (2006)

    Google Scholar 

  19. Ransbotham, S., Mitra, S., Ramsey, J.: Are markets for vulnerabilities effective? MIS Q. 36(1), 43–64 (2012)

    Article  Google Scholar 

  20. Ratcliff, J., Metzener, D.: Pattern-matching: the gestalt approach. Dr Dobbs J. 13(7), 46 (1988)

    Google Scholar 

  21. Rescorla, E.: Is finding security holes a good idea? IEEE Secur. Priv. 3(1), 14–19 (2005)

    Article  Google Scholar 

  22. Senter, R., Smith, E.: Automated readability index. Technical report, DTIC document (1967)

    Google Scholar 

  23. Shahzad, M., Shafiq, M., Liu, A.: A large scale exploratory analysis of software vulnerability life cycles. In: International Conference on Software Engineering (2012)

    Google Scholar 

  24. Zhao, M., Grossklags, J., Chen, K.: An exploratory study of white hat behaviors in a web vulnerability disclosure program. In: 2014 ACM CCS Workshop on Security Information Workers (2014)

    Google Scholar 

  25. Zhao, M., Grossklags, J., Liu, P.: An empirical study of web vulnerability discovery ecosystems. In: 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS) (2015)

    Google Scholar 

  26. Zhao, M., Laszka, A., Maillart, T., Grossklags, J.: Crowdsourced security vulnerability discovery: modeling and organizing bug-bounty programs. In: HCOMP Workshop on Mathematical Foundations of Human Computation (2016)

    Google Scholar 

Download references

Acknowledgment

We thank the anonymous reviewers for their comments. The research activities of Jens Grossklags are supported by the German Institute for Trust and Safety on the Internet (DIVSI).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingyi Zhao .

Editor information

Editors and Affiliations

Appendices

A Example Bug Bounty Rule Statements

We list example rule statements below:

1. “Please report serious vulnerabilities in our website (https://staging.factlink.com), proxy (https://staging.fct.li), or other components (our annotation library, Wordpress plugin, browser extensions, and gems)” (Factlink)

2. “Please note that Binary.com’s front-end code is open-sourced at [...] - please feel free to report any vulnerabilities found in this code by submitting a pull-request in github” (Binary)

3. “Not in scope: shopify.asia, go.shopify.com and investors.shopify. com are operated by third parties, and are not in scope” (Shopify)

4. “Any Sucuri customer website are out of the scope of this disclosure program” (Sucuri)

5. “Mattel websites and services are owned and operated by Mattel and are explicitly outside the scope of this bug bounty program” (ToyTalk)

6. “Please only use our staging environments for testing, they are otherwise identical to production” (Factlink)

7. “In general, anything which has the potential for financial loss or data breach is of sufficient severity, including: XSS, CSRF, Authentication bypass or privilege escalation, Click jacking, Remote code execution, Obtaining user information, Accounting errors” (Coinbase)

8. “We are generally not interested in DoS vulnerabilities that are perceived by a lack of rate-limiting or captcha. As a web-scale service, our threshold for rate limiting is higher than you would probably expect. Of course, if you think you have found an exception to this rule, please let us know” (Automattic)

9. “Please create a free account and (pen) test away our GhostMail, ChostChat and GhostBox” (Flox)

10. “Please note that automated testing is not permitted! System will ban you permanently if you do” (DigitalSellz); “If you employ automated scanning tools, their requests must be rate limited to not exceed 3 requests per second without prior approval” (Vimeo)

11. “Do not attempt to gain access to another user’s account or confidential information” (Adobe)

12. “You are not allowed to conduct social engineering attacks against our support team” (Coinbase)

13. “While researching, we’d like to ask you to refrain from: [...] Any physical attempts against BitHunt property or data centers” (BitHunt)

14. “In order to encourage responsible disclosure, we promise not to bring legal action against researchers who point out a problem provided they do their best to follow the above” (Openfolio)

15. “You must comply with all applicable laws in connection with your participation in this program. You are also responsible for any applicable taxes associated with any reward you receive” (Twitter)

16. “Yahoo reserves the right to change or modify the terms of this program at any time” (Yahoo)

17. “Yahoo employees and contingent workers, as well as their immediate family members and persons living in the same household, are not eligible to receive bounties or rewards of any kind under the Yahoo Bug Bounty Program, whether hosted by Yahoo or any third party” (Yahoo)

18. “You must be eligible to work within the U.S.; meaning you are a U.S. citizen, a noncitizen national of the U.S., a lawful permanent resident, or an alien authorized to work within the U.S.” (Hack the Army)

19. “You must be 18 years of age or older. Please be an adult when messaging us. We want to work with serious security professionals only” (Envoy)

20. “Share with us the full details of any problem found. Detailed steps on reproducing the bug. If valuable, please include any screen-shots, links you clicked on, pages visited, etc. Provide us with a concrete attack scenario. How will the problem impact Bookfresh or our customers? Put the problem into context” (BookFresh)

21. “Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party” (ownCloud)

22. “Minimum reward is $100 for security vulnerabilities. The reward depends on the vulnerability severity and will be paid via HackerOne only. Every researcher with accepted vulnerability will be mentioned on http://hackerone.com/algolia/thanks (Algolia)

23. “We only reward the first reporter of a vulnerability” (DropBox)

24. “Twitter will determine in its discretion whether a reward should be granted and the amount of the reward” (Twitter)

25. “Post on our Hall of Fame. Your very own Informatica Bug Bounty T-Shirt With More Awesome Swag to Come” (Informatica)

26. “Security and privacy are top priorities at Coursera. We believe that no technology is perfect and that working with skilled security researchers across the globe is crucial in identifying weaknesses in our technology” (Coursera)

B Statistics for Programs Grouped by Description Length

Table 2. Statistics for programs grouped by description length
Table 3. Statistics for programs paying a minimum bounty (grouped by description length)
Table 4. Statistics for programs paying no minimum bounty (grouped by description length)

C Statistics for Programs Grouped by Clauses

Table 5. Statistics for duplicate report, legal action, and public disclosure clauses
Table 6. Statistics for staging sites, test accounts, and downloading source

D Further Readability Analysis

Fig. 6.
figure 6

Program descriptions length and readability, measured using Smog Index [16] and Automated Readability Index [22].

Rights and permissions

Reprints and permissions

Copyright information

© 2018 International Financial Cryptography Association

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Laszka, A., Zhao, M., Malbari, A., Grossklags, J. (2018). The Rules of Engagement for Bug Bounty Programs. In: Meiklejohn, S., Sako, K. (eds) Financial Cryptography and Data Security. FC 2018. Lecture Notes in Computer Science(), vol 10957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-58387-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-58387-6_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-58386-9

  • Online ISBN: 978-3-662-58387-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics