Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?

Black Hat1,033 views30:07about 2 years ago

This research presentation analyzes the impact of public vulnerability disclosure on hacker participation and success rates within bug bounty programs. By examining a large dataset of vulnerability reports from platforms like HackerOne and BugCrowd, the speaker investigates how disclosure influences hacker behavior through the lens of cognitive fixation. The study concludes that while disclosing critical vulnerabilities can attract more hackers and lead to more discoveries, disclosing common or low-severity bugs can lead to cognitive fixation, ultimately reducing the likelihood of finding new, unique vulnerabilities.

Why Public Disclosure of Common Bugs Is Killing Your Bug Bounty ROI

TLDR: Publicly disclosing low-severity or common vulnerabilities on platforms like HackerOne and BugCrowd creates a cognitive trap known as functional fixedness. Researchers who see these reports tend to fixate on the specific techniques used, which blinds them to more creative, unique attack vectors. Organizations should prioritize disclosing only high-severity, complex vulnerabilities to maintain a high-quality, innovative researcher pool.

Bug bounty programs are often treated as a numbers game. Organizations push for more reports, more researchers, and more public disclosure to signal their commitment to security. But this volume-first approach is backfiring. Research presented at Black Hat 2023 by Dr. Ali Ahmed highlights a critical failure in how we manage disclosure: by flooding the zone with common, low-severity bug reports, companies are inadvertently training their researchers to stop thinking creatively.

The Cognitive Trap of Functional Fixedness

Hacking is fundamentally a creative process. It requires looking at an application and seeing possibilities that the original developers missed. However, human psychology dictates that when we are presented with a set of examples, we tend to fixate on those patterns. This is known as functional fixedness. In the context of bug bounties, when a researcher reads a public report about a common vulnerability, their brain subconsciously adopts the methodology of that report.

If a company publicly discloses a dozen variations of a simple Cross-Site Scripting (XSS) or a basic Insecure Direct Object Reference (IDOR) bug, they are essentially providing a roadmap of what has already been tried. Researchers who follow these programs will naturally gravitate toward the same endpoints and the same payloads. They stop looking for the novel, complex bugs that actually threaten the core business logic and instead spend their time hunting for the low-hanging fruit that the company has already signaled is "fair game."

Data-Driven Evidence of Diminishing Returns

The research analyzed over 83,000 vulnerability reports across multiple programs. The data shows a clear, inverse correlation between the volume of public disclosures and the discovery of new, unique vulnerabilities. When a firm increases its disclosure rate for common bugs, the resolution rate for new, high-impact bugs drops.

This isn't just a theory; it is a measurable trend in the data. Experienced researchers are particularly susceptible to this. While a novice might be helped by seeing a few examples, an expert researcher who sees a constant stream of "solved" patterns will subconsciously filter out those areas of the application. They are looking for the "unknown unknowns," and by publicizing the "knowns," the organization is narrowing the researcher's field of vision.

The "Critical Bug" Exception

Not all disclosure is bad. The study found that disclosing high-severity, complex vulnerabilities—the kind that require deep architectural understanding—actually has a positive effect. These reports act as a catalyst for innovation. They challenge the researcher to understand the underlying system architecture rather than just copying a payload.

When you disclose a complex, critical bug, you are signaling to the researcher pool that the program is sophisticated. You are inviting them to play at a higher level. This attracts the top-tier talent who are capable of finding the bugs that automated scanners and script-kiddies will never touch. If you want to attract the best, you have to show them that you are dealing with the best problems.

How to Optimize Your Disclosure Strategy

If you are running a program, you need to stop viewing disclosure as a marketing tool and start viewing it as a strategic lever.

First, stop the "noise" disclosure. If a bug is trivial, common, or easily caught by a standard DAST tool, do not make it public. It provides zero value to the community and actively degrades the quality of your researcher pool.

Second, curate your public disclosure feed. Treat it like a technical blog. Only publish reports that demonstrate unique, clever, or complex exploitation chains. This serves two purposes: it educates the community on what you consider a "good" bug, and it keeps the researcher pool focused on the areas where you actually need the most help.

Third, encourage "program switching." The data suggests that researchers who spend too much time on a single program are more likely to fall into the trap of fixation. If you are a researcher, force yourself to rotate your focus. If you find yourself hitting a wall on a target, stop reading the public reports for that program. Go work on a completely different technology stack for a week, then come back with a fresh perspective.

The goal of a bug bounty program should be to maximize the discovery of high-impact vulnerabilities, not to maximize the number of public reports. By being more selective about what you disclose, you protect the creative potential of the researchers who are trying to help you. Stop feeding them the same old patterns and start challenging them to find the bugs that actually matter.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in