Corporate In October 2013,
Google announced a major change to its Vulnerability Reward Program. Previously, it had been a bug bounty program covering many Google products. With the shift, however, the program was broadened to include a selection of high-risk
free software applications and
libraries, primarily those designed for
networking or for low-level
operating system functionality. Submissions that Google found adherent to the guidelines would be eligible for rewards ranging from $500 to $3,133.70. In 2017, Google expanded their program to cover vulnerabilities found in applications developed by third parties and made available through the
Google Play Store. Google's Vulnerability Rewards Program now includes vulnerabilities found in Google, Google Cloud, Android, and Chrome products, and rewards up to $31,337.
Microsoft and
Facebook partnered in November 2013 to sponsor The Internet Bug Bounty, a program to offer rewards for reporting hacks and exploits for a broad range of Internet-related software. In 2017,
GitHub and The
Ford Foundation sponsored the initiative, which is managed by volunteers including from Uber, Microsoft,
Government In March 2016,
Peter Cook announced the US federal government's first bug bounty program, the "Hack the Pentagon" program. In 2019, The
European Commission announced the EU-FOSSA 2 bug bounty initiative for popular
open source projects, including
Drupal,
Apache Tomcat,
VLC,
7-zip and
KeePass. The project was co-facilitated by European bug bounty platform Intigriti and HackerOne and resulted in a total of 195 unique and valid vulnerabilities. In 2025, the Government of the Czech Republic launched its official bug bounty program on the Hackrate Ethical Hacking Platform.
Platforms There are some platforms—the largest being
HackerOne—that run bug bounty programs on behalf of software vendors and pay rewards set by the vendor. Others include
Cobalt,
Bugcrowd, and Synact.
Open Bug Bounty is a crowd security bug bounty program established in 2014 that allows individuals to post website and web application security vulnerabilities in the hope of a reward from affected website operators. ==Research==