The maximum premium for the base line has increased to $15,000, with a ceiling of $30,000, twice as much as previously to produce high-quality reports for current security vulnerabilities. Chrome OS bug bounty rewards the Google Chrome bug bounty program over the years to include full chain exploits for the same-named Chromebook and Chromebox operating system. -The program’s rewards are to use valid bugs to escape integrated isolated containers, firmware vulnerabilities (processors, built-in controllers, and H1), flaws that may overturn the verified boot mechanism and lead to persistence, and lock screen problems that can be used to circumvent it.   Google’s standing payment has also increased for researchers, who are able to compromise a Chromebook or Chromebox by persistent guest mode; this means “guests with interim reboots, delivered through a Web page,” with $150,000 now available. Earlier this had been limited to $100,000. Fuzzer and patch bonuses The Chrome vulnerability reward program also covers the Chrome fuzzer program, which allows researchers to use their own fuzzers on Google’s hardware and get full retribution for any bugs they uncover. The Chrome vulnerability rewards programme. Google also lists a bonus which has doubled to $1,000. In addition. Another bonus is to researchers who submit a patch for the vulnerability they have found; the payment can vary from $500 to $2,000 depending on quality and complexity. As shown in the table below, the payment bumps are displayed across the board.   Chrome Vulnerability Rewards was developed in 2010 and paid over $5 million in security bugs to researchers.