Google has expanded its bug bounty program to include external attack techniques and vectors which threat actors may exploit to bypass abuse, fraud, and spam systems developed by the company.
On Wednesday, Android software engineer Eric Brown and program manager Marc Henson said in a blog post that the Google Vulnerability Reward Program, which has issued over $12 million in rewards for vulnerability reports to date, will now reward researchers who help the company "mitigate potential abuse methods."
This may include bypassing account recovery systems en masse -- reminiscent of the recent Instagram issue, in which hundreds of users are reportedly unable to access their accounts -- security holes which allow brute-force attacks to occur, the circumvention of restrictions on content use and sharing, or exploits which make it possible to purchase items from Google without payment.
"Valid reports tend to result in changes to the product's code, as opposed to removal of individual pieces of content," the company added.
However, product-specific cases of individual instances of abuse are not included.
In principle, any Google service could be included in the bug bounty extension, including the main .google.com, blogger.com, and youtube.com domains, as well as smart home devices created by the developer, the Google Cloud platform, and browser extensions.
Google is always interested in receiving vulnerability reports including XSS flaws, authentication issues, and server-side bugs. In May, for example, a student was awarded $36,000 for uncovering a remote code execution flaw in the Google App Engine.
Coding errors and programming problems which could permit the circumvention of abuse, fraud, and spam systems, are now just as acceptable.
The practice is not new as the tech giant has been rewarding these types of reports over the past few years but now such findings will be officially acknowledged and rewarded. It is not known, however, what the financial worth of such reports is.