We have long enjoyed a close relationship with the security research community. To honor all the cutting-edge external contributions that help us keep our users safe, we maintain a Vulnerability Reward Program for Google-owned web properties, running continuously since November 2010.
Services in scope
In principle, any Google-owned web service that handles reasonably sensitive user data is intended to be in scope. This includes virtually all the content in the following domains:
Bugs in Google-developed browser apps and extensions tagged as "by Google" in the Chrome Web Store will also qualify.
The program has three key exclusions:
- Non-web applications are generally not in scope. We make special exceptions for Google Wallet and Google Chrome. The Chrome reward program is similar but separate from the process described on this page.
- To allow time for internal review and remediation, new acquisitions are subject to a six-month blackout period. Bugs reported sooner than that will typically not qualify for a reward.
- Zagat is developed and maintained by a third party and is therefore excluded from the program.
Important: Please keep in mind that some Google-branded services hosted in less common domains may be operated by third parties. We can’t authorize you to test these systems on behalf of their owners. Please read the fine print on the page and examine domain and IP WHOIS records to confirm. If in doubt, talk to us first!
Any design or implementation issue that substantially affects the confidentiality or integrity of user data is likely to be in scope for the program. Common examples include:
- Cross-site scripting
- Cross-site request forgery
- Mixed-content scripts
- Authentication or authorization flaws
- Server-side code execution bugs.
Note that the scope of the program is limited to technical vulnerabilities in Google-owned web applications and browser extensions; please do not try to sneak into Google offices, attempt phishing attacks against our employees, and so on.
Out of concern for the availability of our services to all users, please do not attempt to carry out DoS attacks, leverage black hat SEO techniques, spam people, and do other similarly questionable things. We also discourage the use of any vulnerability testing tools that automatically generate significant volumes of traffic.
Depending on their impact, some of the reported issues may not qualify. Although we review them on a case-by-case basis, here are some of the common low-risk issues that typically do not earn a monetary reward:
Cross-site scripting vulnerabilities in “sandbox” domains. We maintain a
number of domains that leverage the same-origin
policy to safely isolate certain types of untrusted content; the most prominent
example of this is
- URL redirection. We recognize that the address bar is the only reliable security indicator in modern browsers; consequently, we hold that the usability and security benefits of a small number of well-designed and closely monitored redirectors outweigh their true risks.
- Legitimate content proxying and framing. We expect our services to unambiguously label third-party content and to perform a number of abuse-detection checks, but as with redirectors, we think that the value of products such as Google Translate outweighs the risk.
- Bugs requiring exceedingly unlikely user interaction. For example, a cross-site scripting flaw that requires the victim to intentionally type in an XSS payload into a search field in Google Maps may have negligible impact in all practical cases.
- Logout cross-site request forgery. For better or worse, the design of HTTP cookies means that no single website can prevent its users from being logged out; consequently, application-specific ways of achieving this goal will likely not qualify. You may be interested in personal blog posts from Chris Evans and Michal Zalewski for more background.
- Flaws affecting the users of out-of-date browsers and plugins. The security model of the web is being constantly fine-tuned. The panel will typically not reward any problems that affect only the users of outdated or unpatched browsers. In particular, we exclude Internet Explorer prior to version 9.
- Presence of banner or version information. Version information does not, by itself, expose the service to attacks - so we do not consider this to be a bug. However, if you find an outdated version of software and can confirm that it's vulnerable to a particular flaw, please let us know.
Nevertheless, vulnerability reporters who work with us to resolve security bugs in our products will be credited on the Hall of Fame. If we file an internal security bug, we will acknowledge your contribution on that page.
Rewards for qualifying bugs range from $100 to $20,000. The following table outlines the usual rewards chosen for the most common classes of bugs:
|accounts.google.com||Other highly sensitive services ||Normal Google applications||Non-integrated acquisitions and other lower priority sites |
|Remote code execution||$20,000||$20,000||$20,000||$1,337 - $5,000|
|SQL injection or equivalent||$10,000||$10,000||$10,000||$1,337 - $5,000|
|Significant authentication bypass or information leak||$10,000||$7,500||$5,000||$500|
|XSRF, XSSI and other common web flaws||$500 - $3,133.7||$500 - $1,337||$500 - $1,337||$100|
 This category includes products such as Google Search (https://www.google.com),
Google Wallet (https://wallet.google.com), Google Mail (https://mail.google.com), Google
Code Hosting (code.google.com), Chrome Web Store (https://chrome.google.com), Google App
Engine (https://appengine.google.com), Google Admin (https://admin.google.com), Google
Cloud Platform (https://cloud.google.com), and Google Play (https://play.google.com).
 Note that acquisitions qualify for a reward only after the initial six-month
blackout period has elapsed.
The final amount is always chosen at the discretion of the reward panel. In particular, we may decide to pay higher rewards for unusually clever or severe vulnerabilities; decide that a single report actually constitutes multiple bugs; or that multiple reports are so closely related that they only warrant a single reward.
We understand that some of you are not interested in money. We offer the option to donate your reward to an established charity. If you do so, we will match your donation - subject to our discretion. Any rewards that are unclaimed after 12 months will be donated to a charity of our choosing.
Investigating and reporting bugs
When investigating a vulnerability, please, only ever target your own accounts. Never attempt to access anyone else's data and do not engage in any activity that would be disruptive or damaging to your fellow users or to Google.
If you have found a vulnerability, please contact us at firstname.lastname@example.org. Please be succinct: the mailbox is attended by security engineers and a short proof-of-concept link is more valuable than a video explaining the consequences of an XSS bug. If necessary, you can use this PGP key.
Note that we are only able to answer to technical vulnerability reports. Non-security bugs and queries about problems with your account should be instead directed to Google Help Centers.
Frequently asked questions
Q: How do I demonstrate the severity of the bug if I’m not supposed to snoop around?
A: Please submit your report as soon as you have discovered a potential security issue. The panel will consider the maximum impact and will chose the reward accordingly. We have routinely paid higher rewards in cases where the attacker didn't even begin to suspect the full consequences of a particular flaw.
Q: I found an outdated software (e.g. Apache or Wordpress). Does this qualify for a reward?
A: Please perform due diligence: confirm that the discovered software had any noteworthy vulnerabilities, and explain why you suspect that these features may be exposed on the affected site. Reports that do not include this information will typically not qualify.
Q: Who determines whether my report is eligible for a reward?
A: The reward panel consists of the members of the Google Security Team. The current permanent members are Artur Janc, Eduardo Vela Nava, Jeremy Zimmer, Martin Straka, and Michal Zalewski, in addition there is a rotating member from the rest of our team.
Q: What happens if I disclose the bug publicly before you had a chance to fix it?
A: Please read our stance on coordinated disclosure. In essence, our pledge to you is to respond promptly and fix bugs in a sensible timeframe - and in exchange, we ask for a reasonable advance notice. Reports that go against this principle will usually not qualify, but we will evaluate them on a case-by-case basis.
Q: I wish to report an issue through a vulnerability broker. Will my report still qualify for a reward?
A: We believe that it is against the spirit of the program to privately disclose the flaw to third parties for purposes other than actually fixing the bug. Consequently, such reports will typically not qualify.
Q: What if somebody else also found the same bug?
A: First in, best dressed. You will qualify for a reward only if you were the first person to alert us to a previously unknown flaw.
Q: My employer / boyfriend / dog frowns upon my security research. Can I report a problem privately?
A: Sure. If you are selected as a recipient of a reward, and if you accept, we will need your contact details to process the payment. You can still request not to be listed on our public credits page.
We are unable to issue rewards to individuals who are on sanctions lists, or who are in countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions lists. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law.
This is not a competition, but rather an experimental and discretionary rewards program. You should understand that we can cancel the program at any time and the decision as to whether or not to pay a reward has to be entirely at our discretion.
Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own.