HackerOne Slashes Bug Bounty Payouts, Citing AI-Driven Report Floods
HackerOne has drastically cut its bug bounty payouts, with critical vulnerability rewards dropping from $9,250 to $2,257 and high-severity bounties from $4,429 to $1,009. Even low-severity findings saw a reduction from $597 to $68. This move, as highlighted by LΣҒΔ𝕽ΩLL 🇮🇱, significantly reduces the financial incentive for researchers, especially those focused on open-source vulnerabilities.
LΣҒΔ𝕽ΩLL 🇮🇱 attributes these cuts primarily to the overwhelming influx of bug reports, many of which are generated or heavily assisted by AI, specifically Large Language Models (LLMs). This surge includes a significant volume of low-quality, often hallucinated, reports that still require manual review and validation by maintainers. The result is a critical bottleneck: more submissions, less human capacity to triage, and ultimately, a reduced budget for legitimate findings.
For defenders, this shift impacts the cybersecurity ecosystem. While AI can certainly aid in vulnerability discovery, the current scenario, as LΣҒΔ𝕽ΩLL 🇮🇱 notes, is creating friction. It disincentivizes serious researchers and could reduce the overall quality of community-driven vulnerability disclosures, potentially leaving critical issues unaddressed longer in open-source projects. CISOs should recognize that the economic model for external vulnerability discovery is evolving rapidly.
What This Means For You
- If your organization relies on public bug bounty programs for open-source dependencies, understand that the landscape is changing. The reduced payouts could deter skilled researchers, meaning fewer eyes on critical open-source vulnerabilities. Don't solely depend on external programs; bolster your internal application security testing (AST) for open-source components and ensure robust software supply chain security practices are in place.
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.