Twitter to pay users $140 for finding security flaws

The social network will pay up to £100 to individuals who find security issues in its platform

Twitter

Twitter has offered individuals who find possible security flaws in its platform a $140 (100) reward.

However, that amount is not set in stone, according to the company.

The social network said in a blog post: "Reward amounts may vary depending upon the severity of the vulnerability reported. Twitter will determine in its discretion whether a reward should be granted and the amount of the reward.

Advertisement - Article continues below

"This is not a contest or competition. Rewards may be provided on an ongoing basis so long as this program is active."

Anyone who reports a flaw will need to prove they are the first to find it and must not disclose it to any other parties, including the media.

Any flaws must also fit alongside Twitter's vulnerability guidelines that include cross-site scripting (XSS), cross-site request forgery (CSRF), remote code execution (RCE), in addition to allowing unauthorised access to protected tweets and direct messages.

If users discovered a vulnerability before 3 September at 10.30AM PST (17.30 GMT) they would not be eligible for the reward unless they reported it previously.

Additionally, anyone based in countries that has security sanctions against it - including individuals in North Korea, Iran, Cuba and Syria - will be exempt from the bounty.

Advertisement
Advertisement - Article continues below

Twitter has been subject to a lot of controversy recently regarding the removal of pictures of recently deceased people.

The social network announced last month it would only remove pictures and accounts of people who had died if relatives provided in depth information about the user and their account.

A number of tech companies offer users rewards for discovering bugs including Microsoft and Yahoo.

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now
Advertisement

Recommended

Twitter reveals tags for government and state media accounts
social media

Twitter reveals tags for government and state media accounts

7 Aug 2020
Malware attacks using machine identities doubled in 2019
cyber security

Malware attacks using machine identities doubled in 2019

4 Aug 2020
Andrew Daniels joins Druva as CIO and CISO
Cloud

Andrew Daniels joins Druva as CIO and CISO

22 Jul 2020
The Twitter hack, and why we need a better class of criminal
hacking

The Twitter hack, and why we need a better class of criminal

18 Jul 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
Police use of facial recognition ruled unlawful in the UK
privacy

Police use of facial recognition ruled unlawful in the UK

11 Aug 2020