Skip to the content.

Posted on 16th October 2025 by

October update - Tsunami reward program

Improving the PRP situation

Since our last update in June, we have made good progress on merging incoming pull requests. Not only do we now have a very low amount of requests to process, but most of them are now implemented with the new templated language system which is usually faster for us to merge.

A big thank you to all of our contributors for their patience!

An update on the payouts

Note: Our official rules have been updated accordingly.

We recently came to realize that our current payout system made the decision for the reward difficult. To ensure everyone is rewarded fairly and adequately, we have decided to simplify the payout system:

Type of detector Reward (up to dollars)
Wishlist detector 3177.13
Exposed interface detector Weak credentials detector 2000
Other detectors 1500

What is a wishlist detector?

This is a detector for a vulnerability that Google cares deeply about. We understand that this is outside of the control of the contributors but this is generally based on internal priorities.

We will generally make it explicit that a contribution falls in that category but on the other hand, we might request that the detector is completed in a faster timeline (less than a week) to justify the higher payout. Sometimes we will release a wishlist to the public – if you pick up an item from that wishlist, you are guaranteed to fall into this category.

What happened to fingerprints?

We are not accepting new fingerprinting contributions for now. Note that pull requests already opened will be processed and paid as previously agreed upon.

We are currently working on completely changing the way Tsunami performs fingerprinting. Amongst other things, we are experimenting with rewriting that specific portion of the scanner in Golang to measure how well the language matches our needs.

An insight into our triage decisions

We also understand that it might be difficult to understand how and why we decide to accept some contributions and not others, so we wanted to provide some visibility into that process.

First and foremost, the goal of Tsunami is to find impactful vulnerabilities. This generally means that we want to identify security issues that have a strong impact; this generally translates to remote code execution (RCE).

The questions that we are always asking ourselves:

Here is an example table for common vulnerability types:

Category Decision
XSS Rejected
CSRF Rejected
SSRF Likely rejected
SQLi Likely rejected
Local file include It depends
Path traversal It depends
XXE It depends
Remote file include Likely accepted
File upload Likely accepted
Exposed interface Likely accepted
Authentication bypass Likely accepted
Weak credentials Likely accepted
OS command injection Likely accepted

As mentioned before, that decision depends heavily on the ability to create a full chain of exploitation that leads to remote code execution.

Tsunami versioning

As we previously announced, we are slowly dropping Maven releases in favor of our Docker images and direct dependencies to GitHub. We are already not publishing any new artifacts to Maven and encourage you strongly to migrate to building with the GitHub code.

This change slightly increases overall maintenance of plugins for larger changes of the core but ensures that issues do not go unnoticed and also makes dependencies management a lot easier for us.