Tuesday, November 12, 2024
HomeBug BountyOpenAI Launched Bug Bounty Program - Rewards up to $20,000

OpenAI Launched Bug Bounty Program – Rewards up to $20,000

Published on

Malware protection

It’s been almost half a year since the revolutionary ChatGPT was released. Amazingly, it reached 100 million users in just two months.

ChatGPT has an unimaginable potential to answer things that need a lot of research. Due to its increasingly demanding usage, securing it from threat actors is also essential. 

The Microsoft-backed platform has launched its Bug Bounty Program on BugCrowd. Many Security researchers have already found some vulnerabilities on ChatGPT, and we’re posting them now and then.

- Advertisement - SIEM as a Service

However, it is now an excellent opportunity for security professionals to report their bugs and get rewarded for their work.

Their rewards are below as per their Bug bounty program and the VRT (Vulnerability Rating Taxonomy) of Bugcrowd.

  • P4 – $200 – $500
  • P3 – $500 – $1000
  • P2 – $1000 – $2000
  • P1 – $2000 – $6500

The program also mentioned that the reward can go up to a maximum of $20,000, making it a huge reward for critical bugs. So far, 14 Vulnerabilities have been reported on the program.

Scope of the Program

The following applications are in scope.

  • ChatGPT, ChatGPT Plus, Logins, Subscriptions, OpenAI-created Plugins created by users, and all other functionalities.

Bugs that can be reported include,

  • XSS or Stored XSS
  • CSRF
  • SQLi
  • Authentication and Authorization Issues
  • Data Exposure
  • Payment based bugs
  • Cloudflare Bypass to send traffic to unprotected endpoints
  • Running queries on private models that are not available to the Public
  • Browsing or Code Interpreter Plugins created by OpenAI
  • SSRF
  • OAuth Flaws
  • Credential Security and making plugin calls to unrelated domains

Since OpenAI has access to the entire internet, issues related to Google Workspace, Asana, Trella, Jira, Monday.com, Notion, Hubspot, and many more related issues related to OpenAI can also be reported.

However, there are restrictions to perform additional security testing on these companies.

Subdomains of openai are also included in the scope of the program. The subdomains of OpenAI can be found at 

  • *.openai.com

Out-of-Scope Vulnerabilities

Though most bugs are eligible for reporting, some of the bugs listed below are out of the program’s scope.

  • Issues based on the Model
  • Brute Forcing API
  • Fuzzing, password spraying unauthorized attacks
  • Stolen or Leaked Credentials stemming
  • Clickjacking
  • SSL/TLS Cipher security issues with PoC
  • Server error messages without exploit proof
  • Old/EoL browser/ plugins related issues and much more

For more information, refer to the Out-of-Scope topic on BugCrowd.

Struggling to Apply The Security Patch in Your System? – 

Related Read:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...