Back in early 2010, Google had started with Chromium Security Research program in a way to encourage external researchers to find bugs in its Chromium project. So far Google has issued well over $300,000 of rewards across hundreds of qualifying bugs. And it looks like Google is ready to expand its Chrome Security Rewards Program. In a blog post, Google has revealed its new plans for Chrome Security Program to cover highly significant bugs.

Google has expanded the scope of the Chromium program which according to the blog post includes:

High-severity Chromium OS security bugs are now in scope. Chromium OS includes much more than just the Chromium browser, so we’re rewarding security bugs across the whole system, as long as they are high severity and present when “developer mode” is switched off. Examples of issues that may generate a reward could include (but are not limited to): 

    • Renderer sandbox escapes via Linux kernel bugs. 
    • Memory corruptions or cross-origin issues inside the Pepper Flash plug-in. 
    • Serious cross-origin or memory corruption issues in default-installed apps, extensions or plug-ins. 
    • Violations of the verified boot path. 
    • Web- or network-reachable vulnerabilities in system libraries, daemons or drivers.

Google has also included “bonuses” ranging from $500 to $1000 if a bug reporter takes on fixing the bug they have found themselves. The base reward for a well-reported and significant cross-origin bug (for example a so-called UXSS or “Universal XSS”) is now $2000.

For more details head over to Chromium Blog.