TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Beg Bounties

280 pointsby 0xedbover 3 years ago

20 comments

LeonMover 3 years ago
As soon as we published a security.txt, we started received multiple beg bounties on a weekly basis.<p>The thing is, that responding to them (regardless what you write) often triggers a drip mail campaign with sad stories of how the &#x27;hackers&#x27; are trying to pay for college, or their sick mother, or whatever typical scam story they can come up with. Within days you&#x27;ll be sifting through dozens of emails, trying to find legit, serious reports.<p>This increases the risk that you skim over a serious report. You now risk a reputation problem, because if you do not reply in a timely manner, some hackers will resort to publication as a way of public shaming. Please, if you are a legit white hat hacker, try to understand with how much junk reports we have to go through. Obviously, we want to credit real hackers :-)<p>Anyway, we deleted our security.txt. This dropped the number of beg bounties significantly (no more automated emails). A real human hacker will find a contact address anyway.
评论 #29149996 未加载
评论 #29150927 未加载
评论 #29152047 未加载
评论 #29150593 未加载
评论 #29153646 未加载
评论 #29152859 未加载
TomGullenover 3 years ago
We get a bunch of these - to be fair to them as mentioned in the article 99% are small setting tweaks we’ve overlooked. I always find it awkward replying to these sorts of reports, usually I go with:<p>“Thanks for your report, we’ve updated the settings. We don’t have an official bounty program but we do sometimes offer them if the issue is severe enough. On this occasion it is not”<p>And that seems to work fine. For ones a little more involved we’ve paid out $50 a few times which they seem happy with and we’re generally ok to pay.<p>These setting tweaks are a source of spam, if you fix them you stop getting the emails.<p>I don’t have a problem with them generally but like Troy mentions the language they use can be quite manipulative and plays on your virtuous characteristics - short concise firm replies is what’s required and then ignore if they reply with beginning.
评论 #29148109 未加载
评论 #29148590 未加载
评论 #29151656 未加载
评论 #29154265 未加载
mythzover 3 years ago
FWIW we&#x27;ve also received the exact same email from the same named person with the same vague text of having &quot;identified a vulnerability in your Web Application&quot;, judging from Troy&#x27;s twitter thread he seemed to have sent the same email to many others.<p>We&#x27;re still waiting on a reply to asses whether there&#x27;s any validity in his claim. I guess what I&#x27;m curious is how do people best handle this situation? Normally if it&#x27;s any other pc security threat or legal liability claim cold emailing us we&#x27;d just report spam &amp; ignore but with a software vulnerability we&#x27;re at duty to investigate, which I expect would make his vulnerability claim so effective with engagement.<p>Given this happened shortly after we added a SECURITY.md to our project with the contact email used, it wouldn&#x27;t surprise me if he is just email spamming the same claim to projects with SECURITY pages where he&#x27;ll expect some payment for just disclosing a GitHub reported dependency vulnerability that nearly every non-trivial npm project has.
评论 #29150949 未加载
评论 #29153193 未加载
tgsovlerkhgselover 3 years ago
The beg bounty hunters make it a giant PITA to report genuine security issues. Even bigger companies end up going through platforms like HackerOne instead of providing a direct security contact, and you end up having to spend time proving&#x2F;explaining to triagers that you have found an actual issue. (The reason why I refuse to use HackerOne is that they require you to agree to their arbitrary terms putting unreasonable restrictions on your ability to publish your research.)<p>Doubly annoying when you find a minor issue where you simply don&#x27;t know whether the company cares about it [1]: Do you report it and risk ending up being flagged as a beg bounty hunter, or do you skip reporting it, potentially leaving an issue open that the company may be interested in fixing?<p>[1] Example: a site that requires TOTP both on login and sensitive actions but allows you to reuse the same TOTP for both if you&#x27;re quick.
tptacekover 3 years ago
I don&#x27;t think he has a particularly persuasive rebuttal to the argument that it&#x27;s not honorable or productive to publicly shame someone who&#x27;s asking to wash your car window for $1. &quot;What if they were saying something&#x27;s wrong with your car?&quot; Wouldn&#x27;t make much difference, Troy.
评论 #29148621 未加载
评论 #29152180 未加载
评论 #29149374 未加载
评论 #29148963 未加载
评论 #29148901 未加载
评论 #29150713 未加载
评论 #29150413 未加载
评论 #29152532 未加载
评论 #29148734 未加载
评论 #29154035 未加载
评论 #29149438 未加载
marijnover 3 years ago
You used to be able to do `git clone <a href="https:&#x2F;&#x2F;codemirror.net" rel="nofollow">https:&#x2F;&#x2F;codemirror.net</a>`, which was kind of neat. But the constant barrage of emails from &quot;security researchers&quot; who had found a &quot;vulnerability&quot; (an exposed git directory holding an open source codebase), have made me configure my server to deny all .git paths.
bawolffover 3 years ago
I suspect 95% of the value provided by services like bugcrowd is preventing the emotional exhaustion of dealing with these type of people.<p>My favorite is i remember getting one about how the site suffers from having perfect-forward-secrecy, which is a &quot;critical&quot; TLS vulnerability that needs to be fixed immediately.
mtmailover 3 years ago
We have &#x27;security bountry program&#x27; listed in our website footer. Also a security.txt. We still gets emails saying they found some kind of vulnerability and if we have a bounty program. Sometimes via our contact form where we can check what the user did on our website prior (usually: nothing). At this point it&#x27;s spam.<p>Most infurating report was that there&#x27;s a world-readable directory listing and people can download files, URL like <a href="http:&#x2F;&#x2F;dowloads.$mycompany.com&#x2F;public" rel="nofollow">http:&#x2F;&#x2F;dowloads.$mycompany.com&#x2F;public</a> with literally a README file explaining that all files are public and meant for people to download.
评论 #29148846 未加载
elondaitsover 3 years ago
We got contacted by someone spoofing an openbugbounty.org report (similar domain, sent from a Gmail account if you checked headers). The report was copy-pasted from one for a different site, and it didn’t really apply for us (but you had to know the internals). Worse part: based on the email the spoofer used, and the one associated with their PayPal, they had two legit profiles in openbugbounty.org with hundreds of verified bounties.
mijoharasover 3 years ago
On the other side of this I remember how diffiicult it was to get through to someone at a company who had somehow left their stripe secret key exposed (along with a bunch of other config vars, including paypal secret, and google private key).<p>I even gave them a specific curl command to see it. After not receiving any response I finally called up customer service, and sometime (months) later they finally fixed it. (They never responded once though, and I couldn&#x27;t be bothered to ask if they rotated their keys like they should have since it was such an arduous process.)
评论 #29151007 未加载
SquibblesReduxover 3 years ago
I have received anonymous security notices that suggest we should send money to the &quot;researcher&quot; who wishes to remain anonymous. While I appreciate receiving information on security vulnerabilities, if the person who contacts me remains anonymous then I consider their communication to be a threat and extortion.<p>If anyone wishes to report a security vulnerability in good faith, and they hope for remuneration of any sort, then they need to identify themselves unambiguously.
评论 #29153468 未加载
ocdtrekkieover 3 years ago
One case I didn&#x27;t see mentioned here, is where well-meaning programs can support beg bounties: I&#x27;ve seen reports sent to an open source product through a platform which is offering up their own bounties for security fixes in open source. A noble idea, but then you get meaningless security reports, combined with them begging you to just go mark them as real security issues so they get a payout, even if it&#x27;s not a real security issue.
评论 #29149238 未加载
jphover 3 years ago
Companies tend to pay more attention, in my experience, when you tell the company you&#x27;re doing coordinated disclosure, and send along a link about how it works, and how it helps the company with security and goodwill.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;joelparkerhenderson&#x2F;coordinated-disclosure" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;joelparkerhenderson&#x2F;coordinated-disclosur...</a>
danielvfover 3 years ago
We have an up to $250,000 bug bounty for reporting a critical vulnerability in some of our code, as well a whole page on reporting issues.<p>Never had a major report, but we get one or two of these SPF&#x2F;DKIM&#x2F;Headers&#x2F;SSL per week.<p>On memorable guy kept emailing us back from different email addresses and using different names for each, but following right along with the thread of the conversation...
tdeckover 3 years ago
Why are the later email exchanges in this post documented through embedded tweets of images of text? On mobile most of the images are cut off in this display format, requiring readers to click through to Twitter to read each one of them. I don&#x27;t really understand why people do this when they can either embed the image directly or just copy-paste the text.
tmcnealover 3 years ago
There seems to be a cottage industry of folks scraping places like ProductHunt and hitting them up with these emails. We posted to ProductHunt twice and got multiple &quot;beg bounties&quot; along with someone claiming they could get us to #1 product of the day, for a nominal fee of course.
aeronauticusover 3 years ago
So I wonder how much of this is related to an article I read a while back about certain cyber sec (legit or not) university programs that encourage (read: require) their students to essentially pull this stuff in order to get their names out there (name of the individual and&#x2F;or the school). The effort is pretty much a naked attempt to drum up a pile of &quot;finds&quot; and show your socials that you are a &#x27;security professional&#x27; (padding the resume, so to speak). The thing about this effort is that those schools are actively driving their students to do this in order to graduate, if the article was correct..... Not certain if this is the other side of the situation, but compelling.
ok123456over 3 years ago
What&#x27;s wrong with full disclosure? It&#x27;s the only thing that really works.<p>So what if someone is slightly embarrassed? Lag time for &quot;responsible disclosure&quot; is often on the scale of months-to-quarters. If it&#x27;s truly a real security problem and not just some made up attack that can only happen in a lab under ideal conditions, it will be a red-ball.
评论 #29151112 未加载
paulpauperover 3 years ago
Unless it it a major breach or affects operations, big companies generally do not care about this sort of stuff
vmceptionover 3 years ago
I don’t agree with the holier then thou gatekeeping that Troy is attempting to justify here<p>I do agree that Responsible Disclosure™ is bullshit, “beg bounties” are a symptom. Troy’s approach is a symptom. Saying “look at me, I <i>never</i> ask for money” is so immature and privileged and lacks empathy when he goes through the exact same thing but then blames it on other people. He genuinely believes that his database of hacker goodies and monetization paths is better in some moral sense and says “no, everyone else is wrong” after people on twitter are like “dude, wtf”.<p>It would be wrong even if he had zero monetization paths too.
评论 #29149842 未加载