Google Play Security Reward Program (GPSRP) is a bug bounty program offered by Google Play, in collaboration with HackerOne and the developers of certain popular Android apps. It recognizes the contributions of security researchers who invest their time and effort in helping make apps on Google Play more secure.
The goal of the program is to identify and mitigate vulnerabilities in participating apps on Google Play, and keep Android users, developers and the Google Play ecosystem safe.
Developers of Android apps are invited __to join the program to help incentivize security research through the bug bounty model.
i. How Does it Work?
ii. Program Rules
iii. Vulnerability Criteria & Rewards
iv. Scope
v. Legal Points
At a high level :
At this time, the following vulnerabilities qualify for the Google Play Security Reward Program. This list may be expanded in the future to cover more issues.
RCE (Remote Code Execution) vulnerabilities and corresponding POCs (Proof of Concepts) qualify for a $20,000 reward. The RCE vulnerability should allow an attacker to run native ARM code of their choosing on a user’s device without user knowledge or permission.
Examples may include:
Please note, executing arbitrary JavaScript does not qualify for the RCE category.
Vulnerabilities and corresponding POCs (Proof of concepts) that lead to theft of private data qualify for a $3,000 reward, based on the following criteria:
Additionally, vulnerabilities that result in unauthorized, irrecoverable destruction of sensitive user data listed above may also qualify (e.g. deleting a user’s account, irrecoverable destruction of data, etc.).
Note: To qualify for a reward, the data theft must occur either through MITM of the network or a hostile app installed on the same device. If a hardcoded key or secret is found within the app that provides access to sensitive data types listed above, this may also count.
Vulnerabilities and corresponding PoCs (Proof of Concepts) where an app component processes a passed Intent (e.g. from startActivity, sendBroadcast, startService, or bindService) from another app without properly validating the Intent, resulting in the target app performing an operation that the sending app doesn't have permission to do qualify for a $3,000 reward. The operation in question needs to be security-relevant (e.g. changing sharing settings to provide an attacker unauthorized access to sensitive data, publishing/editing something on behalf of the user without their consent which exposes sensitive data, changing security settings in a way that makes it easier to compromise the user's data or functionality, changing or providing unauthorized access to credentials, etc).
Vulnerabilities and corresponding PoCs (Proof of Concepts) where an app processes malicious input from another application on the same device, resulting in code execution on the device (e.g. ARM, Java) will qualify for a $4,000 reward. For example:
For more information on vulnerability classes, please see this PDF: {F681840}
A note on SDK and library vulnerabilities - if you have identified a vulnerability in an SDK or library used by an app developer (but not maintained by the app developer), please submit it directly to the maintainer of the affected software. If this is not possible and you leverage HackerOne’s Disclosure Assistance as described in the Scope section to submit a report on a vulnerable app due to an SDK or library they are using, please note that SDK and library vulnerabilities will only receive a single payout at 2x the normal reward amount (e.g. a $3k issue would be worth $6k) to reflect the additional impact of these types of bugs. If multiple reports of the same SDK or library vulnerability are received, even across different apps, they will be considered duplicates of the earliest report submission due to having the same root cause.
Issues already known to Google (and in the process of being mitigated/fixed) that can be used to uncover similar vulnerabilities across multiple apps in Google Play Store will be published to the Known issues list. Such vulnerabilities are not deemed severe enough to warrant the default reward from Google Play (while still being relevant for the developer to fix - and pay, where applicable), but may qualify for a smaller bounty (listed below).
Issue Category | Reward (Issued by GPSRP) |
---|---|
Theft of sensitive data via malicious URL input and symlinks* (effective | |
November 9, 2019 - reports received before November 9 will still qualify at | |
the original reward amount) | $500 |
Theft of sensitive data via malicious URL input and javascript: URLs** | |
(effective November 9, 2019 - reports received before November 9 will still | |
qualify at the original reward amount) | $500 |
Theft of sensitive data via malicious URL input and file: URLs*** (effective | |
November 9, 2019 - reports received before November 9 will still qualify at | |
the original reward amount) | $500 |
Malicious URL input resulting in leaking session information**** (effective | |
December 15, 2019) | $500 |
Specifically, passing malicious URL input to an app resulting in the app processing a symlink that results in access to sensitive data.
Specifically, passing malicious URL input to an app resulting in the app
processing a javascript: style URL resulting in access to sensitive data.
Specifically, passing malicious URL input to an app resulting in the app
processing a file: style URL resulting in access to sensitive data.
**For example, passing malicious URL input to an app that results in the
user navigating to an attacker-controlled website, where the app automatically
appends cookies or parameter values containing session information to the
requests.
There is no requirement that OS sandbox needs to be bypassed.
Only Google developed applications and those developed by participating developers (in the list below) are in scope to be considered for a bounty. Only vulnerabilities that work on Android 5.0 devices and higher will qualify.
Hackers - if you have general feedback based on your experience with GPSRP and participating app developers, please submit it here __. If you need assistance with a specific app developer, please submit a GPSRP mediation request __.
App developers - if you feel you are in the incorrect tier, please contact gpsrp[@]google.com. These average stats are updated periodically based on publicly accessible metrics.
Tier 1 programs have average first response times of < 1 day, and resolution times of <= 1 month.
Organization/Developer | Package Name | Submit vulnerabilities to: |
---|---|---|
Grammarly | com.grammarly.android.keyboard | <https://hackerone.com/grammarly> |
JNJ Mobile | com.jnj.mocospace.android | <https://hackerone.com/jnj_mobile> |
Line | jp.naver.line.android | <https://hackerone.com/line> |
Livestream | com.livestream.livestream | <https://hackerone.com/livestream> |
Mail.Ru | ru.mail.cloud, ru.mail.auth.totp, ru.mail.mailapp, com.my.mail, | |
ru.mail.calendar | <https://hackerone.com/mailru> | |
MobiSystems | com.mobisystems.msdict.embedded..., com.mobisystems.fileman, | |
com.mobisystems.office | <https://hackerone.com/mobisystems_ltd> | |
PicsArt | com.picsart.studio | <https://hackerone.com/picsart> |
Priceline | com.priceline.android.negotiator | |
<https://hackerone.com/priceline> | ||
Showmax | com.showmax.app | [https://tech.showmax.com/security/ |
__](https://tech.showmax.com/security/ "https://tech.showmax.com/security/") | ||
Spotify | com.spotify.music, com.spotify.tv.android, com.spotify.s4a | |
<https://hackerone.com/spotify> | ||
Sweatcoin | in.sweatco.app | <https://hackerone.com/sweatco_ltd> |
Vimeo | com.vimeo.android.videoapp | <https://hackerone.com/vimeo> |
Zomato | com.application.zomato, com.application.zomato.ordering | |
<https://hackerone.com/zomato> |
Tier 2 programs have average first response times of <= 1 day, and/or triage times of <= 5 days, and/or resolution times of <= 3 months.
Organization/Developer | Package Name | Submit vulnerabilities to: |
---|---|---|
Airbnb | com.airbnb.android | <https://hackerone.com/airbnb> |
Coinbase | com.coinbase.android, org.toshi, com.coinbase.pro | |
<https://hackerone.com/coinbase> | ||
Dropbox | com.dropbox.android, com.dropbox.paper | |
<https://hackerone.com/dropbox> | ||
Fitbit | com.fitbit.FitbitMobile | [https://www.fitbit.com/bugbounty |
__](https://www.fitbit.com/bugbounty "https://www.fitbit.com/bugbounty") | ||
Grab | com.grab.food.dax, com.grabtaxi.passenger, com.grabtaxi.driver2 | |
<https://hackerone.com/grab> | ||
Lyft | me.lyft.android, com.lyft.android.driver | |
[https://www.lyft.com/security __](https://www.lyft.com/security | ||
"https://www.lyft.com/security") | ||
PayPal Inc. | com.paypal.android.p2pmobile, com.paypal.here, | |
com.paypal.merchant.client, com.xoom.android.app, com.venmo | ||
<https://hackerone.com/paypal> | ||
com.pinterest | [https://bugcrowd.com/pinterest | |
__](https://bugcrowd.com/pinterest "https://bugcrowd.com/pinterest") | ||
Shopify | com.shopify.pos, com.shopify.mobile, com.shopify.pos.customerview | |
<https://hackerone.com/shopify> | ||
Snapchat | com.snapchat.android | <https://hackerone.com/snapchat> |
Tesla | com.teslamotors.tesla | [https://bugcrowd.com/tesla |
__](https://bugcrowd.com/tesla "https://bugcrowd.com/tesla") |
Tier 3 programs either do not meet the criteria for tier 2 or above, or do not publicly display metrics around time to first response, time to triage, or time to resolution.
Organization/Developer | Package Name | Submit vulnerabilities to: |
---|---|---|
8bit Solutions LLC | com.x8bit.bitwarden | |
[security@bitwarden.com](https://hackerone.com/mailto:security@bitwarden.com | ||
"security@bitwarden.com") | ||
Alibaba | com.alibaba.aliexpresshd | [https://security.alibaba.com/en/ |
__](https://security.alibaba.com/en/ "https://security.alibaba.com/en/") | ||
Ayopop | com.ayopop | [devops@ayopop.com](https://hackerone.com/mailto:devops@ayopop.com |
"devops@ayopop.com") | ||
delight.im | im.delight.letters | <https://hackerone.com/delight_im> |
com.facebook.katana, com.facebook.orca, com.instagram.android | ||
[https://www.facebook.com/whitehat/report/ | ||
__](https://www.facebook.com/whitehat/report/ | ||
"https://www.facebook.com/whitehat/report/") | ||
IRCCloud | com.irccloud.android | <https://hackerone.com/irccloud> |
Kingsoft Office | cn.wps.moffice_eng | |
[wps_security@kingsoft.com](https://hackerone.com/mailto:wps_security@kingsoft.com | ||
"wps_security@kingsoft.com") | ||
Language Drops | com.languagedrops.drops.international, | |
com.languagedrops.drops.scrips.learn.write.alphabet.letters... | ||
[security@languagedrops.com](https://hackerone.com/mailto:security@languagedrops.com | ||
"security@languagedrops.com") | ||
Ok.Ru | ru.ok.android, ru.ok.messages, ru.ok.live | <https://hackerone.com/ok> |
Opera | com.opera.browser, com.opera.mini.native, com.opera.touch, | |
com.opera.app.news | [https://security.opera.com/report-security-issue/ | |
__](https://security.opera.com/report-security-issue/ | ||
"https://security.opera.com/report-security-issue/") | ||
Quvideo Inc | com.quvideo.xiaoying, com.quvideo.slideplus | |
[googlesecurity@quvideo.com](https://hackerone.com/mailto:googlesecurity@quvideo.com | ||
"googlesecurity@quvideo.com") | ||
Smule | com.smule.singandroid.* | [android-security@smule.com](https://hackerone.com/mailto:android- |
security@smule.com "android-security@smule.com") | ||
Telegram Messenger LLP | org.telegram.messenger | |
security@telegram.org | ||
Tinder | com.tinder | [https://www.gotinder.com/security |
__](https://www.gotinder.com/security "https://www.gotinder.com/security") | ||
VHX | tv.vhx.* | <https://hackerone.com/vhx> |
VK.com (V Kontakte LLC) | com.vkontakte.android, com.vk.admin, com.vk.quiz | |
<https://hackerone.com/vkcom> | ||
VLC | org.videolan.vlc | [https://www.videolan.org/security/ |
__](https://www.videolan.org/security/ "https://www.videolan.org/security/") | ||
Yandex LLC | ru.yandex.disk, ru.yandex.taxi, ru.yandex.metro, ru.yandex.music, | |
ru.yandex.mail, ru.yandex.weatherplugin, ru.yandex.searchplugin, | ||
ru.yandex.yandexmaps, ru.yandex.market, com.yandex.browser, | ||
ru.yandex.yandexnavi | [https://yandex.com/bugbounty/report/ | |
__](https://yandex.com/bugbounty/report/ | ||
"https://yandex.com/bugbounty/report/") |
Over time, additional apps may come into scope, so please check back regularly.
For Finders who participate in certain programs of particular customers, to the extent described in the Program Policies, HackerOne may share contact information about those Finders (name, company name (if applicable) and email address) to allow those Customers to contact those Finders to allow them to interact directly.
If you believe you’ve identified a vulnerability in a Play app not listed in scope, please disclose the vulnerability directly to the app developer. If the app developer is unresponsive or does not have a means of receiving vulnerability reports, and the app has over 100 million installs (as indicated on the Google Play Store), you may attempt to disclose the issue to the app developer by submitting the vulnerability to this program under the “App on Play with >= 100 million installs, not listed in scope” asset. Please review the terms listed in the asset’s description before submitting your report. Google makes no guarantees in terms of the ability of HackerOne or Google to successfully disclose the issue to the affected app developer. If the issue qualifies based on the criteria listed in this policy, it may be eligible for a reward.
If an app developer has a publicly facing vulnerability disclosure or bug bounty program, you can submit a reward claim to this program (as you would for the apps specifically listed in scope) as long as the developer has already confirmed that the vulnerability has been fixed in the last 90 days. The application must have over 100 million installs (as indicated on the Google Play store).
Google will reach out to the affected app developer to confirm your claim and determine if the report is eligible for a reward based on the current vulnerability criteria. If the app developer has a private program, please ask the app developer for permission before submitting a reward claim here.
We are unable to issue rewards to individuals who are on US sanctions lists, or who are in countries subject to US sanctions. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law. This is not a competition, but rather an experimental and discretionary reward program. You should understand that we can cancel the program at any time and the decision as to whether or not to pay a reward has to be entirely at our discretion. Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own. To avoid potential conflicts of interest, we will not grant rewards to people employed by Google or Google Partner companies who develop code for devices covered by this program.
Thank you for helping improve the security of the Google Play ecosystem!
The following sections outline updates to the policy that will replace the above policy, and will come into effect for any reports submitted on or after March 11, 2020. Note the following sections do not include the scope section or introductory paragraphs, but that content will largely remain the same. This update is being added to the policy two weeks earlier than its effective date to help provide advance notice of these upcoming changes.
GPSRP focuses on identifying vulnerabilities in popular Android apps on Google Play (i.e. with 100 million or more installs, and any apps listed in scope). Please see the rules and reward criteria below for more detail.
Disclosure Process
To Developer: If an organization has their own public means of receiving vulnerability reports (security@ email address and associated disclosure policy, or a public vulnerability disclosure or bug bounty program), always submit the vulnerability to them first. After the vulnerability is fixed (or if 30 days have passed with no response), you can submit the vulnerability details to GPSRP.
To GPSRP: If an organization has no obvious public means of receiving vulnerability reports and the app has 100 million or more installs, you may attempt to disclose the issue to the app developer by submitting the vulnerability directly to GPSRP.
Please review the terms before submitting your report. Google makes no
guarantees in terms of our ability to successfully disclose the issue to the
affected app developer. If the issue qualifies based on the criteria listed in
this policy, it may be eligible for a reward.
Duplicates
A “duplicate” refers to when a vulnerability report is submitted that is very similar or exactly the same as a previously submitted report.
SDK and library vulnerabilities
Rewards are based on impact and exploitability. The following table outlines the usual rewards chosen for the most common classes of bugs.
| 1) Remote / no user interaction | 2) User must follow a link, vulnerable app
must be already installed | 3) User must install malicious app or victim app
is configured in a non-default way | 4) Attacker must be on the same network
(e.g. MiTM)
---|---|---|---|---
Arbitrary code execution | $20,000 | $10,000 | $4,000 | $1,000
Theft of sensitive data | $5,000 | $3,000 | $1,000 | $500
The following sections outline the impacts above in more detail.
In order to qualify, ACE should allow an attacker to run native ARM code of their choosing on a user’s device without user knowledge or permission, in the same process as the affected app (there is no requirement that the OS sandbox needs to be bypassed).
Examples may include:
Executing arbitrary JavaScript does not qualify. Tricking a user into installing an app and executing code within that app itself does not qualify.
This impact category includes vulnerabilities that lead to unauthorized access to sensitive data from an app on an Android device.
For the scope of this program, sensitive data is classified as:
Location information alone does not qualify (unless combined with the ability to uniquely identify an individual by name).
Access to non-sensitive internal files of another app does not qualify.
Examples of vulnerabilities that result in this impact include, but are not limited to:
For more information on vulnerability classes, please see this PDF: {F681840}
Issues already known to Google (and in the process of being mitigated/fixed) that can be used to uncover similar vulnerabilities across multiple apps in Google Play Store will be published to the known issues list. Such vulnerabilities are not deemed severe enough to warrant the default reward from Google Play (while still being relevant for the developer to fix), but may still qualify for a smaller reward (listed below).
Issue Category | Reward |
---|---|
Theft of sensitive data via malicious URL input and symlinks, javascript: | |
URLs, file: URLs, content: URLs, or custom deeplinks. E.g. passing malicious | |
URL input to an app resulting in the app processing a link of this nature or | |
other URL that results in access to sensitive data. | $500 |
Malicious URL input resulting in leaking session information. E.g. passing | |
malicious URL input to an app that results in the user navigating to an | |
attacker-controlled website, where the app automatically appends cookies or | |
parameter values containing session information to the requests. (effective | |
December 15, 2019) | $500 |
We are unable to issue rewards to individuals who are on US sanctions lists, or who are in countries subject to US sanctions. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law. This is not a competition, but rather an experimental and discretionary reward program. You should understand that we can cancel the program at any time and the decision as to whether or not to pay a reward has to be entirely at our discretion. Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own. To avoid potential conflicts of interest, we will not grant rewards to people employed by Google or Google Partner companies who develop code for devices covered by this program.
For Finders who participate in certain programs of particular customers, to the extent described in the Program Policies, Google may share contact information about those hackers Finders (name, company name (if applicable) and email address) with app developers to verify the hacker was the original reporter of an issue, and to allow those app developers to contact those Finders to allow them to interact directly. For any reward claim on a fixed vulnerability, Google will reach out to the affected app developer to confirm your claim and determine if the report is eligible for a reward based on the current vulnerability criteria. If the app developer has a private program, please ask the app developer for permission before submitting a reward claim here.
Thank you for helping improve the security of the Google Play ecosystem!
Scope Type | Scope Name |
---|---|
android_application | com.livestream.livestream |
android_application | tv.vhx.* |
android_application | com.vimeo.android.videoapp |
android_application | com.application.zomato.ordering |
android_application | com.languagedrops.drops.scrips.learn.write.alphabet.letters.characters.language.japanese.korean.chinese |
android_application | com.languagedrops.drops.international |
android_application | ru.yandex.yandexnavi |
android_application | com.yandex.browser |
android_application | com.snapchat.android |
android_application | com.xoom.android.app |
android_application | in.sweatco.app |
android_application | com.my.mail |
android_application | org.telegram.messenger |
android_application | com.dropbox.android |
android_application | com.shopify.pos.customerview |
android_application | com.shopify.mobile |
android_application | com.grabtaxi.passenger |
android_application | com.grab.food.dax |
android_application | com.shopify.pos |
android_application | ru.ok.live |
android_application | ru.ok.messages |
android_application | ru.ok.android |
android_application | ru.yandex.yandexmaps |
android_application | com.vk.quiz |
android_application | com.vk.admin |
android_application | com.ayopop |
android_application | com.spotify.s4a |
android_application | com.spotify.music |
android_application | com.opera.touch |
android_application | com.opera.mini.native |
android_application | com.opera.browser |
android_application | com.application.zomato |
android_application | com.vkontakte.android |
android_application | com.venmo |
android_application | com.paypal.merchant.client |
android_application | com.paypal.here |
android_application | com.teslamotors.tesla |
android_application | im.delight.letters |
android_application | com.showmax.app |
android_application | com.irccloud.android |
android_application | com.x8bit.bitwarden |
android_application | ru.yandex.market |
android_application | ru.yandex.searchplugin |
android_application | ru.yandex.weatherplugin |
android_application | ru.yandex.mail |
android_application | ru.yandex.music |
android_application | ru.yandex.metro |
android_application | ru.yandex.taxi |
android_application | ru.yandex.disk |
android_application | com.duolingo.tinycards |
android_application | org.videolan.vlc |
android_application | com.quvideo.slideplus |
android_application | com.quvideo.xiaoying |
android_application | com.smule.singandroid.* |
android_application | com.dropbox.paper |
android_application | com.grammarly.android.keyboard |
android_application | com.fitbit.FitbitMobile |
android_application | com.airbnb.android |
android_application | ru.mail.mailapp |
android_application | jp.naver.line.android |
android_application | ru.mail.auth.totp |
android_application | ru.mail.cloud |
android_application | ru.mail.calendar |
android_application | com.opera.app.news |
android_application | com.picsart.studio |
android_application | me.lyft.android |
android_application | com.instagram.android |
android_application | com.facebook.orca |
android_application | com.facebook.katana |
android_application | com.priceline.android.negotiator |
android_application | com.lyft.android.driver |
android_application | com.pinterest |
android_application | com.jnj.mocospace.android |
android_application | com.coinbase.android |
other | com.alibaba.aliexpresshd |
other | com.tinder |
web_application | com.spotify.tv.android |
web_application | com.mobisystems.msdict.embedded.wireless.oxford.dictionaryofenglish |
web_application | com.mobisystems.office |
web_application | com.mobisystems.fileman |
web_application | org.toshi |
web_application | com.coinbase.pro |
Scope Type | Scope Name |
---|---|
android_application | com.whatsapp.wallpaper |
android_application | com.whatsapp.w4b |
android_application | com.whatsapp |
android_application | com.instagram.boomerang |
android_application | com.instagram.layout |
android_application | com.facebook.mlite |
web_application | com.duolingo |
This program leverage 89 scopes, in 3 scopes categories.
FireBounty © 2015-2024