Bug Bounty Programs in Open Source Projects - Lessons from Implementation and Termination Cases

Tadashi Shigeoka ·  Sat, January 17, 2026

Bug bounty programs (vulnerability reward programs) are gaining attention as a means of ensuring security in open source software (OSS). However, not all OSS projects implement bug bounties.

This article investigates projects that implement bug bounties, projects that don’t, and projects that have recently terminated their programs, exploring the current state and challenges of OSS security.

The Polarization of Bug Bounty Programs

OSS bug bounties are polarized. While Chrome/Android operated by Google pays up to $1 million, many prominent projects like Python, Git, and PostgreSQL provide no monetary rewards at all.

Three factors determine whether a project implements bug bounties:

  • Commercial service integration: Projects closely tied to commercial services provide high bounties
  • Big tech company relationships: Projects involving Google, Mozilla, etc. have ample funding
  • Financial foundation: Non-profit foundations and volunteer-run projects struggle to fund bounties

OSS Projects with Bug Bounty Programs

Big Tech-Led Programs

Google Chrome/Chromium

The Google Chrome Vulnerability Reward Program launched in 2010 as a veteran program. In August 2024, bounties were significantly increased, paying up to $250,000 for high-quality reports of sandbox escape + remote code execution.

References

Android

Android Security Rewards (ASR) launched in 2015 with the industry’s highest bounties.

TargetMaximum Bounty
Titan M chip full escape$1,000,000
Titan M protected data leak$500,000
Lock screen bypass$100,000
Google app RCE (Mobile VRP)$300,000

References

Mozilla Firefox

The Mozilla Bug Bounty Program is one of the oldest in the industry, launching in 2004.

SeverityReward Range (USD)
Critical (RCE, SOP bypass, etc.)$3,000 - $20,000
High$3,000 - $10,000
Medium/Low$500 - $3,000

A unique rule splits bounties for duplicate reports within 72 hours.

References

Microsoft .NET

Microsoft enhanced its program in 2025 for .NET and ASP.NET Core (including Blazor and Aspire), offering bounties up to $40,000. GitHub Actions workflows and F# are also included in scope.

References

Foundation and Community-Led Programs

Kubernetes

The Kubernetes bug bounty is funded by CNCF (Cloud Native Computing Foundation) and operated on HackerOne. Made public in 2020, it covers a broad scope including Kubernetes core code, API server, kubelet, authentication bugs, privilege escalation, RCE, and supply chain.

Bounties range from $100 - $10,000 based on severity (CVSS score), with maximum amounts for Critical-class vulnerabilities.

References

WordPress

WordPress operates a community program on HackerOne. Bounties range from $150 - $1,337+ based on severity, with swag for minor issues. Automattic sponsors the bounties since the program launched in 2017.

References

Internet Bug Bounty (IBB) Partnership

Internet Bug Bounty (IBB) is a pooled fund program launched in 2013, sponsored by Facebook, GitHub, Ford Foundation, and others.

Its key feature is distributing bounties 80% to the finder, 20% to the OSS project. This ensures maintainers who fix vulnerabilities also receive compensation.

ProjectScopeNotes
Node.jsCore runtimeRequires Signal reputation score 1.0+ (from January 2026)
Ruby on RailsFramework core$500 bonus for providing patches
DjangoFramework coreTesting on djangoproject.com prohibited
OpenSSLCrypto libraryBounty eligible via IBB

References

Node.js Quality Control Enhancement

Node.js introduced mandatory “Signal reputation score” requirements in January 2026. After triage operations were paralyzed by a surge in low-quality reports during the holiday period, they shifted to requiring a Signal score of 1.0 or higher from researchers.

References

AI/ML Specialized: huntr.dev

Separate from traditional bug bounties for web services and software libraries, huntr.dev specializes in AI/ML (machine learning) models and their supply chains, experiencing rapid growth.

Project CategoryExamplesBase Bounty
ML FrameworksPyTorch, Keras, transformers$1,500
Inference EnginesONNX, TensorRT, vLLM$1,500
Data ScienceNLTK, Jupyter, pandas$900 - $1,500
ML Opsmlflow, kubeflow, airflow$1,200 - $1,500

A distinctive feature is the dynamic design that increases bounties up to 10x for vulnerabilities enabling read/write access to AI models or training data.

References

OSS Company Bug Bounty Programs

Companies built on OSS products are also actively implementing bug bounty programs.

GitLab

GitLab started a private program in 2014 and went public in December 2018. Bounties range from $100 - $35,000+.

References

Vercel

Vercel, developer of Next.js, launched a $1,000,000 bug bounty challenge in response to a critical vulnerability (CVE-2025-55182, CVSS 10.0) discovered in 2025.

They urgently launched a program on HackerOne offering $50,000 per unique technique to bypass their WAF. It was one of the fastest program launches in HackerOne history.

ItemDetails
Participants116
Submitted reports156
Validated techniques20
Total payout$1,000,000
Attacks blocked6 million+

References

Supabase

Supabase, rapidly growing as an open source Firebase alternative, operates a Vulnerability Disclosure Program (VDP) on HackerOne. Launched in late 2025, it covers api.supabase.com, database.dev, GitHub repositories, and MCP Server.

Note that the endpoint accepting SQL queries (/platform/pg-meta/project_id/query) is designed to execute SQL, so it’s out of scope for SQL injection. Only reports demonstrating privilege escalation are considered valid.

References

Neon

Neon, providing serverless Postgres, launched their bug bounty program on HackerOne in March 2025. After 3 months as a private program, it went public.

SeverityBounty
Critical$3,000
High$1,500
Medium$500
Low$150

Scope covers web applications and APIs, with focus areas on authentication, data protection, and API security. Both staging and production environments are testable, supporting various subscription scenario testing with Stripe test cards.

References

Grafana Labs

Grafana Labs, the open source monitoring and visualization platform, launched their bug bounty program in May 2023. It’s operated through the Intigriti platform.

A notable feature is transparency—researchers are not required to sign NDAs. Findings can be freely published after release. Tiered bounties based on CVSS severity are offered, with bonuses for high-quality reports and PoC submissions.

Multiple vulnerabilities were discovered and fixed through this program in 2025:

  • CVE-2025-4123 (High): XSS vulnerability
  • CVE-2025-3580 (Medium): Security vulnerability
  • CVE-2025-6023 (High), CVE-2025-6197 (Medium)

References

Sentry

Sentry, the application monitoring platform, operates a private bug bounty program on HackerOne. They don’t accept new participants directly—you must first submit a report via email, and if valid, receive an invitation to the program.

They also run a separate “Cookie Bounty” program specializing in cookie-related vulnerabilities, paying $100 per valid report.

References

PostHog (VDP Only)

PostHog, the product analytics platform, does not offer monetary bounties. Instead, they express appreciation for valid vulnerability reports with swag.

They operate a Vulnerability Disclosure Program (VDP) through Bugcrowd and also accept reports at security-reports@posthog.com. They ensure security through annual penetration tests (latest in May 2025) and SOC 2 audits.

References

OSS Projects Without Bug Bounty Programs

Non-Profit Foundation Operations

Apache Software Foundation

Apache Software Foundation has a policy of not offering bug bounty programs as an organization.

While they acknowledge vulnerability reporters by listing names in advisories, they don’t provide monetary rewards. As an alternative, some Apache projects are eligible for bounties through HackerOne’s Internet Bug Bounty.

References

Python Software Foundation

Python Software Foundation doesn’t implement bug bounties as a non-profit organization. PSRT (Python Security Response Team) accepts reports at security@python.org with OpenPGP encrypted communication support.

However, PSF is registered as a CVE Numbering Authority (CNA) with CVE issuance authority. The vulnerability management process itself is rigorously operated.

References

Corporate Policy Non-Participation

HashiCorp (Terraform, etc.)

HashiCorp does not operate a public bug bounty program and does not offer monetary rewards for vulnerability reports. Their policy provides acknowledgment in security bulletins instead of monetary rewards.

References

Red Hat

Red Hat does not participate in or sponsor bug bounty programs. secalert@redhat.com is the reporting channel, with guaranteed acknowledgment within three working days.

Red Hat is registered as a major CVE issuing authority (CNA/Root/CNA-LR) and emphasizes coordinated vulnerability management with the open source community.

References

Community-Driven Development

PostgreSQL

The PostgreSQL Global Development Group has consistently maintained a policy of not implementing bug bounty programs. They officially state: “Please note that the PostgreSQL Project does not offer bug bounties.”

The primary reason for not implementing one is concern about the flood of “low-quality reports” driven by monetary incentives. False positives from automated scanning tools, DMARC configuration issues, or simple misconfigurations that pose no real threat would waste development resources.

References

Git

The Git version control system recommends reporting to git-security@googlegroups.com. As a purely community-driven OSS without funding, they follow a coordinated disclosure process.

References

Linux Kernel

The Linux Kernel is another prominent example without an official bug bounty program. The Linux Foundation states: “Otherwise, please do not expect that you’ll be paid for a vulnerability report, as we have limited resources.”

However, Google effectively provides bounties through kCTF/kvmCTF.

References

OpenSSH

OpenSSH is developed as part of the OpenBSD project, with a security philosophy emphasizing “design that doesn’t tolerate vulnerabilities” over “finding vulnerabilities.” By adopting privilege separation, sandboxing, and modern memory management techniques, they maintain a structure where a single bug doesn’t lead to full system compromise.

References

SQLite

SQLite is developed by a small team centered on D. Richard Hipp. A distinctive feature is their responsiveness—typically fixing issues within hours of discovery.

The development team is critical of the CVE system, arguing: “Very few CVEs written about SQLite are real vulnerabilities in the sense that they do not give any new capabilities to an attacker.”

References

AI-Powered Vulnerability Discovery

For projects without bug bounty programs, AI-automated vulnerability discovery presents both a threat and an opportunity.

OpenSSL had no bug bounty program for years, but in 2025, multiple unknown vulnerabilities were discovered and reported using AI-powered autonomous analysis tools. Many of these vulnerabilities had reportedly been overlooked by human researchers for years.

References

Triage Challenges and Maintainer Burden

When bug bounty programs go “Public,” reports flood in from researchers worldwide, but many are duplicates or invalid.

  • Duplicate reports: Multiple reports for the same bug
  • False Positives: Reports of behavior that isn’t actually a vulnerability
  • Out-of-Scope: Reports on assets outside the bounty scope

Many OSS maintainers are volunteers who become frustrated when development time is consumed processing bug bounty reports. The flood of AI-generated reports risks driving maintainers toward security apathy or project abandonment.

References

Bug Bounty Termination Case: cURL

Five Years of Results and the Decision to End

cURL operated a bug bounty on HackerOne from 2019, paying out over $100,000 for 87 vulnerabilities over approximately 5 years.

However, the bug bounty program was terminated at the end of January 2026.

Termination Reason: Explosive Increase in Low-Quality AI-Generated Reports

The primary reason for termination was the explosive increase in low-quality vulnerability reports generated by AI (so-called “AI slop”).

  • In 2025, the valid vulnerability rate dropped to less than 5% (fewer than 1 in 20)
  • The burden of handling “noise” placed severe strain on developers
  • Declining reporter quality and dishonest responses compounded the issues

Developers determined that maintaining the bug bounty program was counterproductive, ending bounty payments and HackerOne acceptance. They’ve shifted to consolidating vulnerability reporting through GitHub’s vulnerability reporting feature and email.

cURL developer Daniel Stenberg explained the termination: “We suspect the idea of getting money for it is a big part of the explanation. It brings in real reports, but makes it too easy to be annoying with little to no penalty to the user.”

References

Comparison Tables

Big Tech and Foundation-Led

ProjectBountyMax BountyPlatformStart Year
Android$1,000,000Google proprietary2015
Chrome/Chromium$250,000Google proprietary2010
Firefox$20,000HackerOne2004
Kubernetes$10,000HackerOne2020
WordPress$1,337+HackerOne2017
Node.js/Rails/DjangoIBB partnershipHackerOne2013-

OSS Companies

ProjectBountyMax BountyPlatformStart Year
Vercel$50,000/techniqueHackerOne2025
GitLab$35,000+HackerOne2014
Neon$3,000HackerOne2025
Grafana LabsCVSS-basedIntigriti2023
Sentry✅ (Private)HackerOne
SupabaseVDPHackerOne2025
PostHogVDPSwag onlyBugcrowd

Not Implemented / Terminated

ProjectBountyMax BountyPlatformYear
cURL❌ (Terminated)2019-2026
PostgreSQL
Python
Git
Apache
Terraform
Ansible
OpenSSH

Summary

Bug bounty program implementation in OSS projects is polarized based on project funding, governance models, and security philosophy.

Characteristics of Projects with Programs

  • Operating highly organized programs
  • Integrating external research as part of the development cycle
  • Backed by big tech companies or receiving foundation funding

Characteristics of Projects without Programs

  • Emphasizing open source “community autonomy” and “respect for expertise”
  • Practical choice to protect developers from noise
  • Substituting with mature VDP (Vulnerability Disclosure Policy)

Lessons from the cURL Termination

The cURL case highlighted bug bounty challenges in the AI era:

  • Risk of monetary incentives attracting low-quality reports
  • Maintainer exhaustion from triage burden
  • Importance of security reporting infrastructure regardless of bounty availability

Future Outlook

Bug bounties are not a silver bullet. In an era where AI enables vulnerabilities to be found “cheaply and quickly,” what matters is not finding bugs but “the economics of fixing”—how efficiently to fix discovered bugs and rapidly deliver fixes across the ecosystem.

Models like IBB’s 80/20 split, rewarding both finders and fixers, will be the sustainable foundation supporting OSS security going forward.

Regardless of monetary rewards, establishing dedicated reporting channels and coordinated disclosure processes is fundamental to modern OSS security. For guidance on security policy development, please refer to:

That’s all from the Gemba.