Facebook expands bug bounty program to include third-party apps
Social network will reward reports of access token exposure


Facebook has announced the expansion of its bug bounty program to include third-party apps and websites that allow people log into them using Facebook credentials.
The social network said that it will focus on access tokens that are created during logins for users and apps.
Dan Gurfinkel, Facebook security engineering manager, said that while a user can decide what information the token and app can access as well as what actions can be taken, "if exposed, a token can potentially be misused, based on the permissions set by the user".
"We want researchers to have a clear channel to report these important issues, and we want to do our part to protect people's information, even if the source of a bug is not in our direct control," he added.
To that end, Facebook has updated its terms of service for the bug bounty program to include information about what it expects from these reports.
"For example, researchers should make sure to include a clear proof-of-concept demonstrating a vulnerability that could allow access or misuse of user access tokens associated with apps on the Facebook platform," said Gurfinkel.
He added that the social network will only accept reports if the bug is discovered by passively viewing the data sent to or from a device while using the vulnerable app or website. Potential bounty hunters will not be permitted to manipulate any request sent to the app or website from their device, or otherwise interfere with the ordinary functioning of the app or website in connection with submitting their report.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Facebook will pay at least $500 for any vulnerable app or website that involve "improper exposure of Facebook user access tokens".
Once a bug has been confirmed by Facebook, it will then contact the app or website developer to fix their code. "We will also automatically revoke access tokens that could have been compromised to prevent potential misuse, and alert those we believe to be affected," said Gurfinkel.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Should your business start a bug bounty program?
In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
By Kate O'Flaherty
-
OpenAI to pay up to $20k in rewards through new bug bounty program
News The move follows a period of unrest over data security concerns
By Ross Kelly
-
Windows 11 System Restore bug preventing users from accessing apps
News Microsoft has issued a series of workarounds for the issue which is affecting a range of apps including Office and Terminal
By Ross Kelly
-
Windows 10 users encounter ‘blue screen of death’ after latest Patch Tuesday update
News Microsoft said it is working on a fix for the issue and has offered users a temporary workaround
By Ross Kelly
-
SpaceX bug bounty offers up to $25,000 per Starlink exploit
News The spacecraft manufacturer has offered white hats immunity to exploit a wide range of Starlink systems, with a dedicated report page
By Rory Bathgate
-
Microsoft announces lucrative new bug bounty awards for M365 products and services
News The new awards will focus on scenario-based weaknesses and offer bonuses of up to 30% for the most severe bugs
By Connor Jones
-
Adobe forced to patch its own failed security update
News Company issues new fix for e-commerce vulnerability after researchers bypass the original update
By Danny Bradbury
-
Google doubles bug bounty rewards for Linux, Kubernetes exploits
News The increased rewards are said to align better with the community's expectations of a bug bounty programme of this kind
By Connor Jones