This article is a) very long and written mostly as a whitepaper/opinion piece and less of a journalistic report b) it's very likely a paid hit piece against bug bounty companies.
However, I'm not surprised as the timing makes sense. The COVID-19 situ has impacted a lot of pen-testing firms [canceled testing contracts/security staff augmentation, longterm security audits] and it's expensive AF for these companies to keep their consultants on bench.
Bug bounties are by no means perfect, but whatever this article is trying to point out isn't going to stop CISO's from doubling down on bug bounties. In fact, CISO's who've been skeptic about BBs will be now be pressed to explore this option even more.
About Me: Sold a few security startups, before that worked as the head of app sec testing for a bailed out british investment bank.
Who would pay to put a hit piece on bug bounty providers? What pentesting firm do you think has their shit together to the extent that they run a media relations team? Who among them don't have revenue streams from triage consulting?
It's a bad article. CSO publishes a lot of bad articles. But there's no way this is a paid piece. The people quoted in this article believe what they're saying.
> has their shit together to the extent that they run a media relations team.
Any company that drops cool research (ATM / Automotive hacking / SCADA etc) use PR firms to drum up their work (which is fair IMHO for SEO/showcasing your new capabilities and service offerings). I did it and I know loads of boutique firms in the UK who do it. I also know of education companies working closely with PR firms to publish articles about "cybersecurity skills gap" or "cybersecurity shortage" to manufacture and invent demand and they are pretty effective too.
So it's not that outlandish to think that security companies aren't tactical enough to have PR companies write such articles either. My suspicion about this specific article was given its timing.
> Who among them don't have revenue streams from triage consulting?
Trigale Consulting is good money but it's mostly getting crumbs from the master's table. BB's are at the apex of this pyramid and will continue to do so. Sharp boutique firms that specialize in stuff will obviously always thrive but that's a diff topic
>It's a bad article. CSO publishes a lot of bad articles.
Agree
> But there's no way this is a paid piece.
Maybe but I'm still doubtful.
> The people quoted in this article believe what they're saying.
I'm quoted in the article. I was not paid for it. I am a practitioner, and I believe what I am saying. Which, to reiterate succinctly, is:
- Bug bounties are a waste of time and money for most startups, because you will drown in nonsense scanner findings.
- There is a straightforward explanation in which HackerOne benefits from that dynamic, and their business model incentivizes them to make that dynamic worse, not better.
I would be happy to debate those points, but frankly they don't seem that controversial.
While I am not speaking for Latacora in the article, I obviously make money when Latacora does, so your claim warrants analysis. Latacora's business model is long term proxies for an initial security hire. It does not include "triage consulting" as a revenue line item. We do not do one-off 2x2 pentests. There is relatively little overlap between our clientele (startups considering their first security hire) and the companies spending a lot of money on bug bounties. Most of our clients do not, and generally should not, host bug bounties. For clients that do, we operate the program, but do not bill separately for that service. Therefore Latacora's financial incentive would clearly be to have H1 run the program with triage, because it straightforwardly removes a cost. Our business incentives are aligned with security outcomes, because we stick around long enough for the impact of our choices. I think bug bounties are fine for a subset of customers. Given the size of our consultancy and our customer base and the somewhat obvious fact we're resource constrained in scaling, it's fairly clear I have no financial stake in this: people do not buy more Latacora because they bought less HackerOne. I can't speak for HackerOne, but I can't imagine they think we're a competing service, not do we think the converse.
COVID-19 has impacted a lot of consultancies. It has also made stock markets overall drop 30%, so the suggestion that this article is some kind of consultancy cabal master plan to screw over bug bounty programs specifically I think requires a more evidence to be credible. As Thomas has pointed out: the idea that this is some kind of PR campaign does not pass the sniff test. Our headcount is a baker's dozen. We do not employ a PR firm. You're probably right that, say, NCC does, perhaps NCC considers themselves a proxy good for H1, but no NCC representative is quoted in the article.
Moussouris is a former executive and current shareholder of HackerOne. It's true that she is still in the bug bounty business! But if you look at how their business is structured, it emphasizes fewer, larger corps and governments and longer-term engagements with a strong compliance and legal focus. Whatever upside she gets from bug bounties being painted in a positive light but HackerOne in a negative one (stipulating this article does that, which I think is questionable), does not weigh up to the clear likely financial incentive she does have where HackerOne does extraordinarily well, IPOs, and her shares turn liquid and she gets a big payday. Do you have evidence that is not the case?
I don't really see how the legal experts in the article taking the position that e.g. these bug bounty companies regularly violate AB-5 unless they mean it. Perhaps they are getting paid, but that's a pretty serious allegation I haven't seen any evidence for. And, if they're just in it for the money, wouldn't it be much easier for them to take it from the allegedly-violating side and argue _their_ case? The contractor-turned-employee side isn't exactly where the money is, and I can't imagine whatever the going rate for a quote is is the most effective way for a lawyer to make money. (Regardless, I am not a legal expert, and AB-5 violations are not part of my argument--the extent of my argument is that "this is a paid hit piece" seems unlikely for them.)
Like I said in another comment, you may not have been paid because of this article, but the advertisers on CSO online paid for this article in part. So even if it wasn't a paid piece, it was paid for by others in the industry.
That is obviously not what you meant, and one way we know that is you wrote a comment insinuating this at length and in particular about multiple people quoted in the article, one of whom you now find yourself conversing with.
> it's very likely a paid hit piece against bug bounty companies.
A thought on the incentives behind such a paid piece. There is a big free rider problem here. All pentesters, or all opponents of big bounty programs, would benefits equally from a hit piece, or to be more specific, would benefit proportionally to their market share. So suspicion on who would pay for a hit piece should fall mostly on entities who control a substantial portion of the market share, or some kind of lobbying organization/cartel representing multiple entities that add up to a substantial market share. Or some entity that makes a financially bad decision and ignores the free rider problem to fund the hit piece - but at that point, you don’t need the hit piece to be paid at all. It’s just ideologically motivated.
Perhaps. I’m inclined to see this opinion piece, through the lens of “Wittgenstein’s Ruler”: If you use a ruler to measure a table, you may also use the table to measure the ruler.
I think bounty programs are mostly a bad idea for startups and medium-sized tech companies. That said, the critiques in this piece do not make a lot of sense to me.
Take transparency. The claim this article makes is that commercial bounty programs work against transparency by paying researchers only when they agree to NDAs. But transparency isn't a norm in software security to begin with; most vulnerability researchers work for labs and consultancies that rarely if ever disclose vulnerabilities. Disclosure of findings is not a norm on commercial software security assessments. Meanwhile, for any target an independent researcher can lawfully assess, the researcher retains the ability to ignore the bounty program and publish straight to Twitter.
My sense of it is that HackerOne has probably increased transparency, in the sense that I've read a lot of published reports on H1 that I don't expect I would have seen if the platform didn't exist, and, in my commercial work, haven't seen a lot of private reports that cut the other way.
Or this "Safe Harbor" argument, that commercial bounties force researchers to sign NDAs to be immunized from CFAA suits and prosecutions. Sure, but in the absence of H1, most of those CFAA immunizations weren't available on any terms. H1 doesn't enforce CFAA liability; CFAA liability is a natural default under US law. If anything, H1 is mitigating CFAA concerns, not amplifying them.
I don't know what to say about the labor law concerns here. I know that the people offering legal opinions here are lawyers and are versed in California labor law. But knowing what I know about how bug bounty people work: there is no way the median bug bounty "participant" would qualify for minimum wage and benefits at the various companies they interact with. The modal bounty participant has a grab bag of a couple dozen scripts they spam against hundreds of different companies with bounties. Is the claim here that H1 owes them a wage? Is the argument here simply that H1 needs to move out of California?
The minimum wage thing doesn't ring true either, since it implies that all project-based consulting --- that is, non-T&M consulting where clients pay an agreed-upon rate for an outcome regardless of the time a project takes to complete --- is susceptible to the "ABC" test as well. But project contracts are very common in California. I'm sure there's a subtlety I'm missing.
The "ISO compliance" thing is just silly. By the logic in this article, practically none of the thousands of commercial application pentests performed in 2020 to date will be "ISO compliant".
Ultimately: I think if you have to ask, you shouldn't run a bounty program. But that's mostly because I think bounty programs don't work very well, and generate an avalanche of noise. I don't think many of the reasons in this article matter.
> Meanwhile, for any target an independent researcher can lawfully assess, the researcher retains the ability to ignore the bounty program and publish straight to Twitter.
I've had vuln disclosures go bad before and after the rise in popularity of bug bounty programs, so I'm probably qualified to chime in here.
Before HackerOne, the default for a company that didn't receive vuln reports well was to threaten you and/or your employer with lawsuits.
This happened to me with Bullhorn and Intuit, despite my investigation and reports being unrelated to my employment. They ultimately went no where, but I imagine the conversation I wasn't present for was, at best, awkward.
Last year, under one of my aliases, I found a vuln in Credit Karma, and the H1 triage staff declared it out of scope. So I posted it on Github/Twitter.
Instead of threatening to sue, CreditKarma asked me to pull the tweets/gists and walked back the H1 triage decision and ultimately awarded a bounty for my finding.
Thus, I don't buy the chilling effects narrative the article tries to sell. It actually made security research more normalized than it used to be.
Of course, I go back to the 1990s with this stuff, and your experience matches mine, to the extent that I got lawsuit threats for doing research on programs I ran on my own machines. I find the idea that H1 is making it legally riskier to conduct research patently silly.
> But that's mostly because I think bounty programs don't work very well, and generate an avalanche of noise.
I think this perception might be because H1 didn't provide triaging for a while, but I think the situation is much better now. Bugcrowd has been triaging bugs for yonks. That makes it even less attractive for bounty hunters to spam low-quality reports.
I'm quoted in the article, so I feel I should point out I didn't coordinate w/ Latacora, and am speaking for myself only and I largely agree with most of what Thomas says here.
To summarize, my argument is:
- Bug bounties are a waste of time and money for most startups, because you will drown in nonsense scanner findings.
- There is a straightforward explanation in which HackerOne benefits from that dynamic, and their business model incentivizes them to make that dynamic worse, not better.
Commercial bug bounty companies like Hackerone and Bugcrowd will suffer the most from the crisis for sure. Even more then pentesters. When there are such cool sites like Openbugbounty, all they have to do with their abnormal pricing is to organize their own funerals.
> "I've seen some quote unquote valid vulnerability reports," Laurens ("lvh") Van Houtven, principal at Latacora, a secops and cryptography expert, tells CSO. "If someone asked me 'should I put this in my appsec report?', I'd say 'you can put it in there, but I will never let you live it down.'"
Is there any reason that someone who works for a company that wants to be perpetually hired by startups to do security would poo-poo a bug bounty program? This comment seems pretty motivated.
Additionally, a vulnerability is a vulnerability. Plenty of companies get owned due to pretty trivial vulnerabilities.
> Moussouris, now founder and CEO of bug bounty consultancy Luta Security, questions how much of HackerOne is real.
Again, could be motivated.
> The bug bounty platforms' NDAs prohibit even mentioning the existence of a private bug bounty. Tweeting something like "Company X has a private bounty program over at Bugcrowd" would be enough to get a hacker kicked off their platform.
Sure. How many traditional pentesters are signing NDAs?
> Consider a finder who spends weeks or months of unpaid work to discover and document a security flaw. Someone else independently discovers, documents and submits that same bug five minutes before the first finder. Under the rules of most HackerOne and Bugcrowd bounty programs, the first submitter gets all the money, the second finder gets nothing.
How are we proposing this alternately works in a way that isn't gameable by having control of multiple accounts?
> The lack of vetting of bug bounty hunters, where anyone, including this reporter, can sign up for a HackerOne or Bugcrowd account with any email address, is the key sticking point, Antokol says.
> Bugcrowd declined to elaborate on what the process of pre-vetting researchers actually looks like. So, this reporter signed up for an account and had immediate access to all public programs without any additional steps.
What is really the point of this so-called journalism? In the preceding paragraphs we were complaining about NDAs stopping people talking about private programs, then complaining about the lack of vetting, then saying we gain access to the PUBLIC programs when we sign up, then saying the bug bounty companies refuse to talk about their vetting methods??? What is this? I can see why Bugcrowd and Project Zero refused to talk to this person.
> Mature organizations can and should run their own VDP in house. If they are ready for an avalanche of dubious bug reports, they might optionally choose to run a bug bounty.
I have a feeling that this journalist is pretty in bed with the traditional pen-testing industry. His history of articles is pretty focused. Bug bounty programs use a customer's real money to pay out bugs. Bugcrowd, at least, triages those bugs before any payment is made. It is in the interest of nobody involved to submit "dubious" bug bounty reports. The only way I can explain that opinion is to think it comes from the mouth of someone with a grudge.
We bootstrap security teams in a long-term engagement. We staff bug bounty programs, but do not bill for that service separately. If a client uses H1 and pays them for triage, it fairly straightforwardly removes a cost for us.
The bug bounty nonsense spray I'm talking about is "sev crit: DMARC is set to quarantine instead of reject" and literal descriptions of how session cookies work (that inexplicably get paid out for: we've seen it happen). I assume we're in agreement I should not be fine with people putting that in pentest reports; if that's the case, the quote is not really controversial: all it says is that H1 has a lot of nonsense reports.
The mechanism GP describes would require Latacora to be a proxy good for H1. Do you believe that is the case?
I'd find it hard to believe a company that was positioning itself as experts in security wouldn't be motivated to talk down the output of other security vendors.
This is a superficial argument of a form the guidelines for the site ask you not to make. (I'm affiliated with Latacora, for what it's worth; you're just dead wrong about the commercial motivations here).
In good faith I'm addressing your comment about a security vendor's motivations. I don't really mind who it is or what industry it is. I expect a database company to talk down the capabilities of other database companies, even if they sometimes use or provide that company's products.
In good faith or otherwise, the site demands you assume good faith of the people you're arguing with. You cannot do that while calling people's statements "motivated". I speak with some authority on Latacora's "motivations". You're wrong about them (rather the opposite motivation exists), but that's besides the point: they aren't in bounds for discussion here. It would be similarly unfair for me to go look you up and call your affiliations into question.
You're wrong, quite obviously, about other things too. For instance: 'It is in the interest of nobody involved to submit "dubious" bug bounty reports'. In reality, the quality of bug bounty reports across all these platforms is a running industry joke. It's hard to believe anyone could run a public bounty program and believe that bogus reports were not a norm. They're practically all you get.
(I laughed audibly at the sentence in your post where you implied that P0 and Bugcrowd were organizations of similar stature and repute).
> In good faith or otherwise, the site demands you assume good faith of the people you're arguing with. You cannot do that while calling people's statements "motivated".
So what I'm hearing you say is that a quoted person's motivations aren't up for discussion in the comments section when they're posted as an article on this site.
> It would be similarly unfair for me to go look you up and call your affiliations into question.
That's totally fine, I follow you on twitter, you can look up my linkedin, I'm not exactly making a secret of anything here.
> In reality, the quality of bug bounty reports across all these platforms is a running industry joke.
Maybe internally amongst the incumbents but the industry is growing.
> I laughed audibly at the sentence in your post where you implied that P0 and Bugcrowd were organizations of similar stature and repute.
I don't understand how you got that out of me saying I can understand why both those groups refused to talk to this journalist.
The "industry" has had many years to grow, and what I see recently is the same as what I saw years ago: DKIM spam and redirect filter bypasses for long-defunct versions of Firefox.
I am not aware of any shift in the perception of bounty submission quality, where people in the field are now saying "huh, suddenly the bounty inbounds we're getting tend to be legitimate and interesting". If that were happening, it would be newsworthy.
> I am not aware of any shift in the perception of bounty submission quality,
Sure, we agree on that, but that doesn't mean these companies aren't growing - let me be more explicit here - financially.
It'll be newsworthy if the perception "in the field" of required bounty submission quality doesn't match what clients will actually happily accept and pay out, won't it?
I see you trying to walk this back, but to be clear: you wrote pretty directly as if there was no incentive for bounty participants to submit bogus bounty reports --- practically in those words --- and, obviously, the exact opposite is self-evidently true to anyone who has ever managed a bounty program.
You could have just written that the article was bad. You'd have been right! But instead you wrote a long comment about how everybody quoted in the piece was talking their book, and then doubled down with some crazy assertions.
It isn't in bounty hunter's interest to submit bogus reports. Where have I said it doesn't happen, regardless?
I even said at one point, in response to you, directly:
> That makes it even less attractive for bounty hunters to spam low-quality reports.
The "less" there definitely doesn't imply that there are no low-quality reports. Bounty hunters absolutely spam low-quality reports, and there are consequences for that.
Sorry if that wasn't clear.
> But instead you wrote a long comment about how everybody quoted in the piece was talking their book,
Two people and the author. "Everybody" is hyperbolic and I think the article makes some good points.
> crazy assertions
Didn't you think I consider GOOGLE's Project Zero to be an equivalent organisation to Bugcrowd?
Were you suggesting it was against the rules to question the motivation of people quoted in articles on hackernews?
(Full disclosure: I am the Latacora person quoted in the article. While I didn't coordinate my quote w/ Latacora and speak only for myself, I've documented elsewhere in the comments[0] why I think the idea that Latacora and by proxy I would stand to financially benefit from HackerOne failing doesn't hold water, so I won't repeat that here, but I'm happy to have that argument there if you'd like.)
> It isn't in bounty hunter's interest to submit bogus reports. Where have I said it doesn't happen, regardless?
They clearly do: companies pay out for (and H1 triage regularly fails to filter) complete nonsense findings to the tune of several hundreds of dollars or more. If you can weaponize that process, you can make a decent chunk of change.
There's also no real reputational damage, as long as it remains trivial to Sybil all of the platforms. The platforms are disincentivized to stop that, because anecdotally "number of hackers on platform" is a stat that plays really well in their sales process, and it's a drum they beat loudly.
Finally, if you agree that it happens all the time, why do people keep doing that if it is truly against their interests?
> The platforms are disincentivized to stop that, because anecdotally "number of hackers on platform" is a stat that plays really well in their sales process, and it's a drum they beat loudly.
Anecdotally, the "number of hackers on platform" number is a statistic that causes consternation within the bug bounty community, specifically the number spruiked by some players.
> They clearly do: companies pay out for (and H1 triage regularly fails to filter) complete nonsense findings to the tune of several hundreds of dollars or more.
I said this elsewhere:
> I think this perception might be because H1 didn't provide triaging for a while, but I think the situation is much better now.
I'm absolutely sure there are still issues. I can't speak to the H1 process because I've never worked with it.
I'm not here to wildly gesticulate at H1 like they're bad, though. I want them to do well. But have you tried Bugcrowd? I hear its laughable to compare them to Google Project Zero, but they've been nice to me, so yeah.
I don't think either you or your colleague are really owed any gentleness from me at this point, so:
I think you should both expect people to question your motivations if you get quoted in articles about another section of your own industry.
I think you're both incredibly naive if you think bug bounty providers are systemically benefitting from the reputational damage the perception, that bug bounty reports are automatically generated script-kiddie outputs, delivers.
I also think that you both need to cultivate a rudimentary understanding of how journalism works. Journalists are paid, almost entirely, by advertisers. Journalists get information from their contacts in the industry. Call of Duty gets great reviews in part because game journalists want to keep getting invited back to events, and because they know the ads for the game aren't likely to run next to a negative review.
Hey, perhaps you did legitimately believe what you said in the article. But the journalist involved was motivated by many other things, and you may have been a useful... uhhh... something-or-other in the service of their greater agenda, keeping their advertisers coming back. Who would advertise on a website called CSO online, you ask....?
I think we can both agree that people on bb platforms can be total amateurs. Gotta start somewhere.
I have no idea if bounty providers are benefiting from the spray-and-pray bogus submissions that characterize the majority of all bounty submissions. I rather expect that they aren't, and that they're a scourge for everyone involved (other than the sprayers themselves).
But you didn't say "these submissions are bad". You said no incentive caused them to exist at all. As I've said repeatedly, without even a faint rebuttal: you can't ever have managed a bug bounty program and believe that statement is true. It is a crazy thing to say.
I honestly don't give a shit about "CSO Online" (I had no idea anyone from Latacora was quoted in it). As you saw upthread: I think this is a dumb article. But your response to it managed, somehow, to be even dumber, and that's what we're litigating now.
Could you, the guy who assumed I was directly comparing a relatively small startup with Google and uproariously laughed at that comparison, quote me on where I said "no incentive caused them to exist at all"?
Could you maybe give this a rest? The continued presumption of bad faith is objectionable and not consistent with expected standards of this site. And it is boring.
Bug bounty programs don't make much sense to me. Why would you find bugs and hire external people to fix them when you can hire external people to find bugs and pay trusted employees to fix them? Just hire pentesters.
Bug bounty programs are not supposed to replace you other security activities, but it's a way for you to have additional source of vulnerabilities. Advantages of these programs is that security researcher will get rewarded when they find a bug, and that there is clear process for disclosing bugs.
You still should hire pentesters, you still should have trusted employees to find bugs and fix them, and more... If you are relying just on bug bounties, your security will suck.
That being said, NDA's sound sketchy, if you disclose bug, than after it is fixed, you should be able to blog about it (or when they do not fix it for looong time).
> Bug bounty programs are not supposed to replace you other security activities, but it's a way for you to have additional source of vulnerabilities.
Exactly the way we position our own Bug Bounty Program. Where the pentesters can be hired to also confirm things done well, the hunters are only paid for failures they found.
In our case there is an added bonus with the Bug Bounty Program: we've come to REALLY apriciate the technical level of reports. Since they only get paid for triagable findings, the details we get reported are so much better then what we used to get from our pentesters. Of course we now require the same quality of reporting from them.
What also helps is that the pentesters are motivated more to deliver higher quality findings since they are aware the service will enter the Bug Bounty Program after their findings are resolved.
Again, BBP should NOT replace your other security activities, they are an additional source with possible unforeseen benefits.
> Why would you find bugs and hire external people to fix them
I don't know why you think that describes security bounty programs? They are about paying external people that find bugs and tell you so you can fix them with your people.
However, I'm not surprised as the timing makes sense. The COVID-19 situ has impacted a lot of pen-testing firms [canceled testing contracts/security staff augmentation, longterm security audits] and it's expensive AF for these companies to keep their consultants on bench.
Bug bounties are by no means perfect, but whatever this article is trying to point out isn't going to stop CISO's from doubling down on bug bounties. In fact, CISO's who've been skeptic about BBs will be now be pressed to explore this option even more.
About Me: Sold a few security startups, before that worked as the head of app sec testing for a bailed out british investment bank.