logoalt Hacker News

addamslast Sunday at 3:21 AM4 repliesview on HN

Microsoft's bug bounty program is a shell of its former self. They quietly disqualified a lot of high-impact findings in 2023.

In my own experience:

- Leaked service principal credentials granting access to their tenant? $0 bounty.

- Leaked employee credentials granting access to generate privileged tokens? $0 bounty.

- Access to private source code? $0 bounty.

Etc.


Replies

refulgentislast Sunday at 3:33 AM

I will forever remain radicalized how every tech company decided to just say fuck it in 2023. (ex-Google and left in 2023 over similar shenanigans)

Should be a major public reckoning over this. But there can't be, they hold the cards, the only real view of this you'd have is day-to-day on Blind and some occasional posts that stir honest discussion here.

I guess we just get to grin and bear it while they give gold statues and millions to the right politicians.

show 1 reply
will4274last Sunday at 8:20 PM

Fwiw, the way it works is that Microsoft doesn't really have a bug bounty program. Individual Microsoft teams have bug bounty programs (or not). Platform teams like Entra, Windows, and Azure have robust programs. However, when teams that operate on top of platforms misconfigure those platforms (as happened here), those bugs are owned by the teams that operate on top of the platform, not by the platform.

show 1 reply
userbinatorlast Sunday at 7:10 AM

Access to private source code?

Have they already gotten so drunk on "zero trust" that they don't think it should matter if attackers see their source code? Then again, they are open-sourcing a ton of stuff these days...

croeslast Sunday at 6:18 AM

They need the money for AI data centers