docs/security/vrp-faq.md
[TOC]
Please report all Chromium security bugs in the tracker using this form or https://bughunters.google.com/report/vrp -> Chrome VRP.
Please check here for any news and updates about the Chrome VRP.
The Chrome Vulnerability Rewards Program (VRP) is the "security bug bounty" for Google Chrome Browser. Please visit the Chrome VRP Rewards and Policies page for full details.
Here are some interesting write-ups of past Chrome security bugs:
We only post links to articles with the author's consent. Please let us know if you would like your work to be shared here.
To help make the process of security bug triage as efficient and smooth as possible, please consider the following best practices for Chromium security bug reports:
--type="renderer") if
code can run in multiple processes.LOG(INFO) << "EXPLOIT SUCCEEDED".--enable-experimental-web-platform-features and
--enable-unsafe-webgpu and instead provide specific feature flags.additional information fields, and the sanitizer should be built using Chrome's standard
mitigation and hardening flags.chromed8 (but do not supply experiment features)pdfium_testMojom interfaces to demonstrate controlled reads or controlled writes in privileged processes are available in vrp_flags.mojom.
To prove a controlled read or write you must attach a small json file
vrp-flag.json to your report:
{
"flag": "read",
"params": {
"process": "browser",
"poc": "poc-read.html",
"chrome_version": "123.6789.0.1",
"os": "win",
"arch": "x64",
"command_line": ["--enable-features=FeatureName", ...],
}
}
poc.html that triggers the bug under ASANpoc-read.html or poc-write.htmlpoc-read.html or poc-write.html will be loaded from a local server, with
mojojs files available under /gen/. If your poc reliably hits the VRP flag,
your report will be eligible for the controlled read or controlled write reward.
If the controlled read or write is not reproducible or not reliable, but the minimized poc does trigger an ASAN report, your issue will receive the standard reward.
The controlled read or controlled write poc must be included in your initial report - we will not consider submissions added at a later time.
Your poc must target a released version of Chrome Stable, Beta or Dev. We will not accept submissions that target Canary or local builds.
At this time we do not accept controlled read/write submissions that patch the renderer or that require multiple files or servers to demonstrate an issue.
Supported operating systems and architectures (with default hardware mitigations enabled):
win - Windows 11 on x64 or ARM64mac - The latest release of MacOS on ARM64linux - The latest release of Debian stable w/wayland on x64 or ARM64Non-standard, debugging or unsafe command line flags and features are not accepted.
This list is not exhaustive but should help reporters focus on issues in Chrome:
git bisect or Chromium's
bisect-builds.py to help locate when the issue went away. Add this evidence
to the bug, ideally identifying the CL which fixed the issue.Payment Options from Legacy to Bugcrowd and enter the
email address for your Bugcrowd account (and hit Save)!Payments Options:
Legacy to receive your payments through Google p2p payments
processing.Bugcrowd to select payments through Bugcrowd. Remember you must
register with Bugcrowd first and enter your Bugcrowd account email in your
Bughunters profile.Request to join our low volume list.
I have a security-related question that is not listed here.