Double Rewards For Finding Bugs In Facebook Ads Code |
Written by Andrew Johnson | |||
Friday, 17 October 2014 | |||
Having fixed several bugs in its ads code internally, Facebook is hoping to get whitehat hackers to uncover any more that are lurking. From now until the end of the year it will pay out double for bugs in ads.
Announcing the incentive for concentrating on ads code rather than the more common parts of Facebook code, Colin Greene notes: At this stage of our bug bounty program, it's uncommon for us to see many of the common web security bugs like XSS. What we see more often are things like missing or incorrect permissions checks, insufficient rate-limiting that can lead to scraping, edge-case CSRF issues, and problems with SWFs. He also provides some examples of bugs that have already been fixed in ads:
In another post A Bounty Hunter's Guide to Facebook, Colin Greene provides updated guidelines on how to submit bugs so as to qualify for a reward. It is worth a careful read if you are new to the Facebook Bug Bounty program. The encouraging bit comes at the top: Since starting our bug bounty program in 2011, researchers have earned over $3 million for helping us make Facebook more secure. So given double rewards are currently on offer, it worth scrutinizing ads more closely than usual.
More InformationDoubling up on Ads Code Bounties Related ArticlesGoogle Increases Maximum Bounty For Chrome Bugs Facebook Pays Out Record Reward Microsoft and Facebook Launch Internet Bug Bounty Scheme Facebook Refuses Bounty, Internet Raises Over $10K To be informed about new articles on I Programmer, install the I Programmer Toolbar, subscribe to the RSS feed, follow us on, Twitter, Facebook, Google+ or Linkedin, or sign up for our weekly newsletter.
Comments
or email your comment to: comments@i-programmer.info |
|||
Last Updated ( Friday, 17 October 2014 ) |