
Follow ZDNET: Add america arsenic a preferred source connected Google.
ZDNET's cardinal takeaways
- The caller programme focuses connected vulnerabilities related to AI products.
- Rewards scope from $500 to $30,000.
- Aaims to tackle past disorder concerning in-scope bugs and problems.
Google has launched a caller bug bounty programme aimed astatine addressing information flaws and bugs successful products related to artificial intelligence (AI).
Also: Google conscionable gave older smart location devices a useful upgrade for free - including these Nest models
On Monday, Google information engineering managers Jason Parsons and Zak Bennett said successful a blog post that nan caller program, an hold of nan tech giant's existing Abuse Vulnerability Reward Program (VRP), will incentivize researchers and bug bounty hunters to attraction connected "high-impact maltreatment issues and information vulnerabilities" successful Google products and services.
Researchers person earned much than $430,000 since 2023, erstwhile Google's bug bounties expanded to see AI-related issues. Now, it is hoped that a standalone programme will promote moreover much reports -- which could beryllium important for nan tech elephantine arsenic it continues to merge AI into its integer merchandise suite.
What qualifies arsenic an acceptable AI-related bug bounty?
Google has separated perchance acceptable reports into nan pursuing areas:
- Rogue actions: Attacks that modify accounts aliases information pinch a information impact. For example, nan usage of an indirect punctual to unit Google Home to unlock a door.
- Sensitive information theft: Attacks starring to nan theft of delicate personification data. These could see indirect punctual injections that nonstop email summaries to a threat character without personification consent.
- Phishing enablement: Phishing onslaught vectors connected Google websites that see persistent, cross-user HTML injections.
- Model theft: Security problems that could let attackers to bargain complete, confidential exemplary parameters, specified arsenic exposed Google APIs.
- Context manipulation: Issues starring to nan persistent manipulation of an AI situation without important personification interaction.
- Access power bypass: Attacks starring to information exfiltration from resources that shouldn't beryllium accessible.
In addition, Google will see reports detailing AI-related issues specified arsenic unauthorized merchandise usage, cross-user denial of service, and different forms of abuse.
Also: Google whitethorn displacement to risk-based Android information spot rollouts - what that intends for you
Products included successful nan caller bug bounty programme see Gemini, Google Search, AI Studio, and Google Workspace.
There are immoderate caveats
The Google engineers person been observant to constituent retired circumstantial out-of-scope items. These see jailbreaks, content-based issues, and AI hallucinations. The squad noted astatine nan end of past year that while immoderate of these areas are of awesome liking to researchers, location tin beryllium difficulties successful replicating nan findings. For example, a jailbreak whitethorn only effect a user's ain session.
Also: This basal Android characteristic is 'absolutely not' going away, says Google - but it is changing
"The squad is alert of nan organization liking and continues to reassess our programme scope astir these issues," Google said.
Furthermore, issues recovered successful Vertex AI aliases different Google Cloud products are not successful scope for this programme and should beryllium reported via nan company's Google Cloud VRP.
Payouts
Reports accepted by Google supply different financial rewards and incentives, pinch payouts for astir reports ranging from $500 to $20,000. For example, a bug bounty describing a terrible rogue action could gain a interrogator up to $10,000, whereas an entree power bypass mightiness salary retired up to $2,500.
Also: Your Android phone's astir powerful information characteristic is disconnected by default and hidden - move it connected now
However, much rate whitethorn beryllium connected connection depending connected nan value of reports and nan "novelty" facet of reported vulnerabilities. The caller programme adopts nan aforesaid attack arsenic Google's wider VRP, and a prize of up to $10,000 -- bringing nan full to $30,000 -- for caller attacks is available.
"We're excited to beryllium launching this caller program, and we dream our weighted researchers are too!" nan engineers said.
Want much stories astir AI? Check retired AI Leaderboard, our play newsletter.
1 month ago
English (US) ·
Indonesian (ID) ·