Discover Bugs In The Top Android Apps And Get Paid $1,000, Google Offers

In the last few years, most of the tech companies have introduced a trend of bug bounty programs. The idea revolves around encouraging the hackers to discover any potential bugs that could cause the system security to be compromised, against cash rewards. In the same tradition, Google has now introduced a new bug bounty program, primarily, to enhance the quality of apps in the Play Store.

The newly-launched bug bounty program is totally different from the other existing bounty program by the tech giant. The older version of the program focuses on discovering bugs in its websites and operating systems. However, the newer version will pay the hackers if they are able to find out vulnerabilities in the top Android apps.

Also Read: Do you know the most popular Play Store contents of all time?

Soon after discovering the flaws, the hackers would be required to notify the developers straightaway. Thereafter, they will work with the developers before generating a report through HackerOne’s bounty program to accumulate their cash reward.

What is the reward?

If any hacker is able to break through any of the top Play Store apps, then Google will pay him a cash reward of $1,000. However, it is pertinent to mention that the hackers cannot select a spammy or already flimsy app, which on the Play Store.

Google will determine several factors while evaluating the success of the security breach: for instance, the clarity of the vulnerability report, the novelty of the problem and the likelihood of user exposure, and the degree of user interaction necessary to exploit the vulnerability.

A hacker would be paid a grand if they are able to discover an eligible bug in the following:

  • Dropbox
  • Duolingo
  • Line
  • Snapchat
  • Tinder
  • Alibaba
  • ru
  • Headspace

Quick Read: Google Play Store is gifting some free cash

The tech giant is looking forward to invite more app developers in the future. The notion is to encourage them to put in everything to find a security flaw against a cash reward.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To Top