Google’s $1.5 Million Bug Bounty: 10 Critical Changes to Android & Chrome Rewards

By

Google has completely overhauled its vulnerability rewards programs (VRPs) for Android and Chrome, introducing a new top bounty of up to $1.5 million for the most sophisticated exploits. The update, announced in early 2025, reflects the escalating arms race between security researchers and malicious actors, while also acknowledging how AI has made certain classes of bugs trivially easy to find. Here are the ten most important changes you need to know about.

1. Maximum Payout Hits $1.5 Million

Under the revised policy, Google will now award up to $1.5 million for a single exploit chain that achieves remote code execution on a locked, unmodified flagship Android device. This is a substantial increase from the previous ceiling of $1 million. The bounty specifically targets full, end-to-end exploits that bypass all existing mitigations without user interaction – the kind of attack that nation-state actors would covet. Researchers must provide a working proof-of-concept that demonstrates the entire chain, from initial entry to data exfiltration or device takeover.

Google’s $1.5 Million Bug Bounty: 10 Critical Changes to Android & Chrome Rewards
Source: www.bleepingcomputer.com

2. Payouts Cut for AI-Easier Bugs

In a controversial move, Google is scaling back rewards for vulnerabilities that artificial intelligence tools can now discover automatically. Cross-site scripting (XSS) in Chrome and certain memory corruption bugs are now considered “low-hanging fruit” thanks to AI-assisted fuzzing and static analysis. The VRP now distinguishes between complex bugs (requiring deep human intuition and contextual understanding) and simple bugs (readily detected by automated tools). Rewards for the latter have been reduced by 30–50% to reflect their decreased rarity and impact on security.

3. Android and Chrome VRPs Now Unified

Previously, Android and Chrome had separate reward programs with differing criteria and tiers. Google has merged them into a single, streamlined VRP with consistent categories and payout amounts. This unification makes it easier for researchers to participate across both platforms and ensures that an exploit chain spanning multiple layers (e.g., a Chrome sandbox escape leading to Android kernel compromise) is evaluated holistically rather than piecemeal. The unified program also introduces a single portal for submissions and tracking.

4. New Focus on Exploit Chains, Not Individual Bugs

While Google still rewards individual vulnerabilities, the big money now goes to full exploit chains that combine multiple bugs to achieve a critical impact. For example, a chain that escapes Chrome’s sandbox, then exploits a privileged Android service to gain root access, could earn the $1.5 million top bounty. This shift encourages researchers to think like attackers and submit complete, weaponized exploits rather than isolated findings. The VRP even offers a 25% chain bonus on top of the sum of individual bug rewards.

5. Strict Demonstration Requirements

To qualify for the highest tiers, researchers must provide a working exploit that runs on the latest public build of Android or Chrome without any user interaction. Google has published a detailed exploit quality rubric that judges submissions on reliability, stealth, and lack of prerequisites (like enabling developer options). Partial exploits – those that only work on debug builds or require physical access – are still eligible but receive significantly lower rewards. The program also now requires a video demonstration for chains claiming over $100,000.

6. Eligibility Expanded to All Researchers

In a bid to attract global talent, Google has removed all geographic restrictions from the VRP. Previously, researchers from certain countries were ineligible due to export control laws. Now, anyone with a valid bank account can submit exploits, regardless of location. Google will handle any necessary legal compliance. The company has also partnered with several bounty platforms to facilitate tax and payment processing in local currencies, making it easier for researchers in developing nations to participate.

Google’s $1.5 Million Bug Bounty: 10 Critical Changes to Android & Chrome Rewards
Source: www.bleepingcomputer.com

7. Chrome Sandbox Escape Bonuses Upgraded

For Chrome specifically, Google has introduced a dedicated bonus pool of $500,000 for sandbox escape exploits that also demonstrate a novel bypass of Site Isolation or similar memory-safety features. This is in addition to the regular bounty for the escape itself. The bonus aims to stimulate research into Chrome’s most hardened defenses. Researchers who find and report a sandbox escape chain within 90 days of a Chrome stable release will receive an extra 20% premium.

8. Faster Triaging and Payment Tiers

Google has committed to triaging all submissions within five business days and issuing initial payments within 30 days of acceptance. The program now features three payment tiers: Critical (up to $1.5M), High (up to $150K), and Medium (up to $30K). Individual vulnerability rewards are capped at $200K for critical bugs. Researchers can also opt for public disclosure after 90 days, which unlocks an additional 10% bonus. The faster turnaround time is expected to reduce frustration and increase researcher loyalty.

9. Comparison to the Old Program

Under the previous VRP, the maximum bounty was $1 million for a full Android exploit chain and $200,000 for a Chrome sandbox escape. Now, the cap has been raised by 50% for Android chains, and Chrome rewards have been restructured to emphasize chaining. However, the old program awarded as little as $500 for some simple XSS bugs; those now earn even less (often $200–$300) because AI can find them automatically. The net effect is a rebalancing that rewards deep offensive security while devaluing surface-level bug hunting.

10. Impact on the Security Research Community

Initial reactions from security researchers are mixed. Many praise the increased top bounty for chains, which aligns with the actual difficulty and value of such work. But others express concern that the reduction in payouts for simple bugs will drive hobbyists away, potentially leaving minor vulnerabilities undiscovered. Google counters that AI can now handle the low-hanging fruit, freeing human researchers to focus on the hardest problems. The long-term impact remains to be seen, but early data shows a 40% increase in submissions for high-impact chains since the change.

Conclusion

Google’s revamped VRP represents a strategic pivot toward quality over quantity. By paying up to $1.5 million for the most advanced exploits and trimming rewards for bugs AI can catch, the company aims to incentivize the kind of deep, creative research that actually protects users from nation-state threats. Whether this approach succeeds will depend on how the security community adapts. One thing is clear: the era of easy bounty hunting is over, replaced by a high-stakes game where only the most skilled players earn top dollar.

Related Articles

Recommended

Discover More

How to Deposit on Aave via MegaETH During the Post-TGE Liquidity Wavemcw777Python 3.15 Alpha 2 Unleashes Statistical Profiler and UTF-8 DefaultHow Flight Recorder in Go 1.25win88win88vnd789bj39bj39mcw777vnd789Microsoft Issues Urgent Alert: Advanced Phishing Attack Targets US Firms with Conduct Report Lurevnd789A New Standard Folder Arrives in Linux Home Directories: Meet 'Projects'vnd789