BUG BOUNTY GUIDE
UPDATED 2026
PART OF OUR 60-DAY COURSE
Google has paid over $50 million to security researchers since launching its Vulnerability Reward Program in 2010 — making it one of the most generous bug bounty programmes in the history of the industry. Every valid security vulnerability found in Google’s products, including Gmail, is reviewed, acknowledged, and rewarded. No grey areas. No legal risk. Just research, report, and get paid. Lets go through this Google Bug Bounty Program comprehensive guide.
Google’s programme covers Gmail, Google Workspace, Google Account, Google Drive, Google Docs, Android, and Chrome — billions of users, enormous attack surface, and a company that genuinely values external researchers finding issues before malicious actors do. This guide explains exactly how the Google bug bounty programme works and how you can participate legally and professionally.
What Is Google’s Vulnerability Reward Program?
Google’s Vulnerability Reward Program (VRP) launched in November 2010 — one of the first major tech companies to formalise external security research through financial rewards. It has since evolved into one of the most comprehensive bug bounty programmes in the world, covering products used by billions of people.
In 2021 Google unified all its security programmes under the bughunters.google.com platform — bringing together the Google VRP, Android VRP, Chrome VRP, and Google Cloud VRP into a single submission interface with consistent policies and a researcher leaderboard.
securityelites.comGOOGLE VRP — KEY PROGRAMME FACTS (2026)
$50M+
Total paid to researchers since 2010
$100
Minimum payout for valid reports
$31,337
Standard max payout (“l33t”)
2010
One of the first major tech VRPs
PROGRAMME HIGHLIGHTS
✓ Open globally — no application required
✓ $100 guaranteed minimum for valid findings
✓ Safe Harbour — legal protection within scope
✓ Covers Gmail, Drive, Workspace, Android, Chrome
✓ Unified on bughunters.google.com since 2021
✓ Researcher Hall of Fame recognition
Google VRP Key Facts — $50M+ paid since 2010, open globally, $100 minimum to $31,337 standard maximum. The “l33t” maximum is a nod to hacker culture. Exceptional findings on critical infrastructure can receive discretionary bonuses beyond the standard maximum.
Google Bug Bounty Payout Tiers — What Gmail Findings Actually Pay
Google’s payout structure is based on the severity and impact of the vulnerability, the quality of the report, and whether the finding is novel. Payouts for Gmail-specific vulnerabilities follow the general Google VRP tier structure, with higher rewards for findings that can affect large numbers of users or lead to account compromise.
Account takeover, authentication bypass, significant access control failure
Ability to take over any Gmail account without user interaction, bypass Google’s login mechanism entirely, or gain unauthorised access to private Gmail data at scale. These are rare but well-rewarded. The $31,337 “l33t” payout signals maximum severity.
Stored XSS affecting Gmail users, significant IDOR, session management flaws
Stored XSS in Gmail that executes in other users’ browsers, IDOR exposing private email content, vulnerabilities in Gmail’s OAuth flow that could allow token theft. The $3,133 figure is another “leet” number (3133 = “ELES”). These are the most commonly achieved high-value Gmail findings.
Reflected XSS, CSRF on account actions, limited information disclosure
Reflected XSS in Gmail’s web interface, CSRF on settings changes, limited exposure of account metadata, open redirects chained with phishing. Medium-severity findings are the sweet spot for intermediate researchers and the most common category of paid Gmail reports.
Missing security headers, minor information disclosure, low-risk misconfigurations
Missing Content-Security-Policy headers on specific Gmail endpoints, minor information leakage in error responses, low-impact open redirects. These build your reputation on the platform and may lead to private programme invitations with higher rewards.
What Is In Scope — Gmail and Google Assets You Can Legally Test
Google’s VRP scope is broad — covering all Google-owned web properties and applications. For Gmail specifically, the in-scope assets include everything under mail.google.com, the Gmail API, and authentication flows under accounts.google.com that affect Gmail access. Always check the current scope documentation at bughunters.google.com before testing.
securityelites.combughunters.google.com — Programme Scope (Representative)
✓ mail.google.com (Gmail web)
✓ Gmail iOS and Android apps
✓ Gmail API (api.gmail.googleapis.com)
✓ Google Account (accounts.google.com)
✓ Google Workspace Gmail features
✓ myaccount.google.com security features
Testing must use your own test accounts only. Never access other users’ data.
✗ Social engineering Google employees
✗ Denial of Service attacks
✗ Physical security testing
✗ Testing against real user accounts
✗ Automated scanning at scale
✗ Third-party Gmail clients (Outlook, etc.)
✗ Spam or phishing campaigns
Safe Harbour: Google will not pursue legal action against researchers who act in good faith within the defined scope and follow programme rules. Always read the current scope at bughunters.google.com before testing.
Google VRP Scope (Representative) — Gmail web, mobile apps, API, and authentication flows are all in scope. Create dedicated test accounts and never test against real user accounts. Read the full current scope at bughunters.google.com before starting any research.
Vulnerability Types That Google Rewards — What Researchers Find in Gmail
XSSCross-Site Scripting in Gmail’s Interface
Gmail’s web interface processes enormous amounts of user-controlled content — email bodies, subject lines, attachment names, contact details, and calendar events. Stored XSS that executes in other Gmail users’ browsers has historically been a productive finding category. Gmail has strong Content-Security-Policy headers but researchers continue to find bypasses in less-tested areas such as Google Workspace admin consoles and new feature rollouts. Pays $500–$7,500 depending on impact.
OAUTHOAuth Flow Vulnerabilities Affecting Gmail Access
Gmail authentication uses Google’s OAuth 2.0 implementation. Researchers have found vulnerabilities in the OAuth consent screen flow, token handling, and scope enforcement that could allow unauthorised applications to gain Gmail access. OAuth vulnerabilities affecting Gmail access are high-priority findings that pay $3,133–$15,000 depending on severity and the scope of access gained.
IDORInsecure Direct Object References in Gmail API
The Gmail API exposes message IDs, thread IDs, label IDs, and attachment identifiers. When access control checks on these resources are insufficient, researchers can access email content belonging to other accounts. Any finding that demonstrates access to another user’s private Gmail content without authorisation is a significant finding. Pays $1,000–$15,000 depending on the data exposed and how many users are affected.
CSRFCross-Site Request Forgery on Gmail Actions
CSRF on sensitive Gmail actions — deleting emails, changing forwarding settings, modifying filters — allows attackers to perform these actions on a victim’s behalf simply by getting them to visit a malicious page. While Gmail has strong CSRF protections on most actions, new features are occasionally added without complete CSRF coverage. Pays $500–$3,133 depending on the severity of the action affected.
Notable Past Google Bug Bounty Reports — Real Examples That Paid
CASE STUDY #1
$5,000
Gmail Stored XSS via Email Subject Line
A researcher discovered that a specific Unicode character sequence in an email subject line, when rendered in a particular Gmail view mode, bypassed Gmail’s content sanitisation and executed JavaScript in the recipient’s browser. The researcher demonstrated cookie theft as proof of impact. Google fixed the issue and paid $5,000.
Vuln: Stored XSS | Severity: High
CASE STUDY #2
$7,500
Gmail API Access Control Bypass
Researcher found that a specific sequence of API calls, when made in a particular order with a manipulated OAuth scope, could read email labels and metadata from a target account without the full gmail.readonly permission being granted. The incomplete scope enforcement constituted unauthorised data access.
Vuln: Access Control | Severity: High
CASE STUDY #3
$1,337
Open Redirect in Gmail Unsubscribe Flow
Researcher discovered that Gmail’s one-click unsubscribe URL parameter could be manipulated to redirect to an arbitrary external URL while using Gmail’s trusted domain. This could facilitate phishing attacks by giving malicious links apparent legitimacy. Paid at the lower end — but a valid and accepted finding.
Vuln: Open Redirect | Severity: Medium
Legal Testing Environment — How to Research Gmail Safely
🔬 Setting Up Your Gmail Research Environment
TEST ACCOUNTS
✓ Create 2–3 dedicated Gmail test accounts
✓ Use plus-addressing: yourname+test1@gmail.com
✓ Note account details in your VRP profile
✗ Never test against real user accounts
✗ Never exfiltrate any real user data
TOOLS
🔧 Burp Suite Community (free proxy)
🔧 Firefox + FoxyProxy + Burp CA cert
🔧 Chrome DevTools (Network tab)
🔧 jwt.io (JWT analysis)
🔧 Note-taking tool for findings
BEFORE TESTING
📋 Read full VRP policy at bughunters.google.com
📋 Verify current scope (updated periodically)
📋 Register and complete researcher profile
📋 Set up note-taking system for findings
📋 Understand Google’s disclosure timeline
How to Write and Submit a Google Bug Bounty Report
securityelites.combughunters.google.com — New Vulnerability Report
Google VRP Report Template — Gmail
TITLE (specific and descriptive)
Stored XSS in Gmail via crafted email subject line — executes in recipient’s browser context
DESCRIPTION
When an email is sent with a subject line containing the character sequence [specifics redacted], Gmail’s subject line renderer fails to sanitise the content before inserting it into the DOM, allowing arbitrary JavaScript execution in the context of mail.google.com when the recipient opens the email.
STEPS TO REPRODUCE
1. Log into Gmail as Test Account A (attacker)
2. Compose an email with subject: [payload]
3. Send the email to Test Account B (victim)
4. Log into Gmail as Test Account B
5. Open the received email
6. Observe: JavaScript executes — alert(document.domain) confirms mail.google.com origin
IMPACT
An attacker can send crafted emails that execute JavaScript in any Gmail user’s browser when opened. This enables session cookie theft (full account takeover), email exfiltration, contact harvesting, and sending further malicious emails from the victim’s account — all without any user interaction beyond opening the email.
Google VRP Report Template — A strong report has four essential elements: specific title, technical description, exact reproducible steps, and clear impact statement. The impact section is critical — explain what an attacker could actually do with this vulnerability. Google rewards quality reports faster and at higher amounts.
The Beginner’s Path to First Google Bug Bounty Submission
1
Build web security foundations first (Days 1–30 of our 60-day course)
HTTP basics, OWASP Top 10, Burp Suite, XSS, IDOR, CSRF. Gmail’s security is world-class — you need solid foundations before you’ll find anything. Our free 60-day bug bounty course at
securityelites.com/bug-bounty/bug-bounty-course/ builds this foundation systematically.
2
Practice on PortSwigger and TryHackMe labs
PortSwigger Web Security Academy (free) has XSS, CSRF, access control, and OAuth labs that directly map to the types of vulnerabilities found in Gmail. Build your muscle memory on practice labs before testing real applications.
3
Focus on new Gmail features — they receive less security review
Google constantly ships new Gmail features — Smart Compose, email scheduling, interactive emails (AMP for Email), Google Meet integration. New code is where vulnerabilities live. When Google announces a new Gmail feature, it becomes a priority target for researchers within days.
4
Study Google’s own security blog and past VRP reports
Google’s Project Zero blog, the Google Security Blog, and disclosed VRP reports on bughunters.google.com all contain examples of the types of vulnerabilities that get accepted and paid. Reading these builds your understanding of Google’s security model and what level of evidence and impact they expect in reports.
Frequently Asked Questions — Google Bug Bounty Program
How much does Google pay for bug bounty reports?
Google pays $100 minimum for any valid finding, up to $31,337 for critical vulnerabilities. Gmail-specific: critical account takeover or auth bypass pays $15,000–$31,337. High-severity XSS or access control pays $3,133–$15,000. Medium severity pays $500–$3,133. Low severity starts at $100. Exceptional findings may receive discretionary bonuses above the standard maximum.
Is the Google VRP open to everyone?
Yes — open globally with no application or qualification requirement. Create a Google account, register on bughunters.google.com, and start researching. Google employees and contractors are excluded. No minimum experience level — valid findings from first-time researchers are paid the same as findings from experienced hunters.
What Gmail features are in scope for Google’s bug bounty?
Gmail web interface (mail.google.com), Gmail mobile apps, Gmail API, Google Account authentication flows, and Google Workspace Gmail features are all in scope. Testing must use your own test accounts — never real user accounts. Always verify the current scope on bughunters.google.com as it is updated periodically.
Where do I submit Google bug bounty reports?
Reports are submitted through bughunters.google.com — Google’s unified vulnerability reward platform. Include a specific title, technical description, exact steps to reproduce, and impact assessment. Google’s security team triages reports and provides feedback on validity and severity.
What is the difference between Google VRP and Google Bughunters?
Google VRP is the original programme name. Bughunters.google.com is the unified submission platform launched in 2021 that consolidates all Google security research programmes. All submissions now go through Bughunters. The reward structure and policies remain unchanged — it is the same programme, modernised interface.
ME
Mr Elite
Founder, SecurityElites.com | Bug Bounty Hunter | Educator
Google’s VRP is one of the most professionally run and fairly compensated bug bounty programmes in the industry. Their security engineering team provides substantive, technical feedback on reports — even ones they decline. Every researcher who submits to the Google VRP learns something from the triage process, regardless of whether the finding is paid. That learning compounds quickly. Build your foundations first, then bring them to the largest target on the internet.