Calling all bug bounty hunters - Google has expanded its challenge to V8 and Cloud
Put your skills to the test and earn some dough in the process
Looking to put your bug hunting skills to good use and earn yourself a pretty penny in the process?
Google has launched its latest bounty challenge rewarding participants for discovering bugs and exploiting vulnerabilities in Chrome’s v8 JavaScript and Google Cloud.
The latest challenge, v8CTF, is a capture-the-flag based bug hunting challenge open to exploit writers.
The 0-day Lottery
As part of Google’s standard Vulnerability Reward Program (VRP), lucky hunters can bag themselves tens of thousands of dollars for discovering and demonstrating the severity of a security vulnerability in any Google or Alphabet subsidiary.
Rewards are offered in the discovery of both known and new vulnerabilities, known as n-day and 0-day vulnerabilities respectively, with rewards available from both the VRP and the v8CTF reward program, with the latter offering $10,000 for each 0-day discovery and exploitation.
“We want to learn from the security community to understand how they will approach this challenge. If you’re successful, you’ll not only earn a reward, but you’ll also help us make our products more secure for everyone. This is also a good opportunity to learn about technologies and gain hands-on experience exploiting them,” Google software engineers Stephen Roettger and Marios Pomonis stated in the Google security blog.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
More from TechRadar Pro
- Keep yourself protected, look at our rankings of the best malware removal software
- Here is our list of the best firewall software
- Keep your business safe with the best endpoint protection

Benedict has been with TechRadar Pro for over two years, and has specialized in writing about cybersecurity, threat intelligence, and B2B security solutions. His coverage explores the critical areas of national security, including state-sponsored threat actors, APT groups, critical infrastructure, and social engineering.
Benedict holds an MA (Distinction) in Security, Intelligence, and Diplomacy from the Centre for Security and Intelligence Studies at the University of Buckingham, providing him with a strong academic foundation for his reporting on geopolitics, threat intelligence, and cyber-warfare.
Prior to his postgraduate studies, Benedict earned a BA in Politics with Journalism, providing him with the skills to translate complex political and security issues into comprehensible copy.