{"id":84704,"date":"2025-02-18T06:00:00","date_gmt":"2025-02-18T14:00:00","guid":{"rendered":""},"modified":"2025-02-18T06:02:08","modified_gmt":"2025-02-18T14:02:08","slug":"bug-bounty-program-results-2024","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/","title":{"rendered":"By Paid Invitation: How Hackers Make Salesforce More Secure in the Agentic AI Era"},"content":{"rendered":"\n<p>Salesforce not only asks ethical hackers to \u201cbreak into\u201d its technology \u2014 it has also invested more than $23 million to date in a <a href=\"https:\/\/www.salesforce.com\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bug Bounty Program<\/a> that encourages it. The program is a critical part of Salesforce\u2019s strategy to identify <a href=\"https:\/\/www.salesforce.com\/platform\/data-security\/what-is-data-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">security gaps<\/a>, protect customer data, and address potential risks before malicious actors can exploit them.<\/p>\n\n\n\n<p><strong>Why it matters: <\/strong>Agentic AI is <a href=\"https:\/\/scet.berkeley.edu\/the-next-next-big-thing-agentic-ais-opportunities-and-risks\/\" target=\"_blank\" rel=\"noreferrer noopener\">raising<\/a> the urgency for organizations to secure \u200csystems increasingly responsible for autonomous decision-making without human input. Bug bounty programs help organizations stay ahead of potential cyberattacks, manipulation, and exploitation, strengthening protections for their systems and data.<\/p>\n\n\n\n<aside class=\"contextual-driver has-text-align-left contextual-driver--einstein\">\n\t<header class=\"tidbit-header\">\n\t\t<h2 class=\"tidbit-head\">\n\t\t\tHow Digital Labor Will Reshape the Enterprise\t\t<\/h2>\n\t<\/header>\n\t<div class=\"tidbit-body\">\n\t\t<p><\/p>\t<\/div>\n\t\t\t<p class=\"tidbit-link label\">\n\t\t\t<a class=\"label has-right-arrow has-right-arrow--small\" href=\"https:\/\/www.salesforce.com\/news\/stories\/agentic-ai-reshapes-workforce\/\" target=\"_blank\">\n\t\t\t\t<span>READ THE STORY<\/span>\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 14 10\">\n\t<path d=\"M13.92 5.38a1 1 0 000-.76.9.9 0 00-.17-.26.25.25 0 000-.07l-4-4a1 1 0 00-1.46 1.42L10.59 4H1.07a1 1 0 000 2h9.52l-2.3 2.29a1 1 0 000 1.42 1 1 0 001.42 0l4-4a.25.25 0 000-.07.9.9 0 00.21-.26z\" \/>\n<\/svg>\n\t\t\t<\/a>\n\t\t<\/p>\n\t\t\t\t<img class=\"tidbit img-einstein\"\n\t\tsrcset=\"\n\t\t\thttps:\/\/www.salesforce.com\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@0.5x.png 84w,\n\t\t\thttps:\/\/www.salesforce.com\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@1x.png 168w,\n\t\t\thttps:\/\/www.salesforce.com\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@2x.png 336w\n\t\t\"\n\t\tsrc=\"https:\/\/www.salesforce.com\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@1x.png\"\n\t\talt=\"Illustration of einstein\"\n\t\tsizes=\"(min-width:1024px) 175px, 130px\"\n\t>\n\t<\/aside>\n\n\n\n\n<p><strong>Go deeper: <\/strong>Bug bounty hunters don\u2019t just look for security flaws\u200c \u2014 \u200cthey also test for AI bias and behaviors that could present risks. Unlike traditional coding, where engineers dictate every step, <a href=\"https:\/\/www.salesforce.com\/agentforce\/what-are-ai-agents\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI agents<\/a> are given a desired outcome and autonomously determine how to reach it. This kind of decision-making demands extra scrutiny to ensure trust.<\/p>\n\n\n\n<p><strong>The hacker perspective:<\/strong> \u201cMy role is to think like a malicious actor in the era of agentic AI \u2013 to anticipate their moves and uncover vulnerabilities before they can exploit them. Salesforce\u2019s bug bounty program is well known among the ethical hacker community \u2013 we look forward to diving deeper with Salesforce into our findings and fortifying the entire digital ecosystem,\u201d said <a href=\"https:\/\/hackerone.com\/naaash\" target=\"_blank\" rel=\"noreferrer noopener\">Avinash Sudheer<\/a> (naaash), an ethical hacker with Salesforce\u2019s Bug Bounty Program.&nbsp;<\/p>\n\n\n\n<p><strong>The Salesforce perspective:<\/strong> \u201cAs we venture further into the era of <a href=\"https:\/\/www.salesforce.com\/agentforce\/what-is-agentic-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">agentic AI<\/a>, where AI agents are increasingly used to support critical business operations, ensuring the protection of data and accounting for potential loopholes is paramount,\u201d said Brad Arkin, Chief Trust Officer. \u201cEngaging with ethical hackers through our bug bounty program is a critical frontline defense for proactively identifying and mitigating vulnerabilities.\u201d<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>As we venture further into the era of <a href=\"https:\/\/www.salesforce.com\/agentforce\/what-is-agentic-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">agentic AI<\/a>, where AI agents are increasingly used to support critical business operations, ensuring the protection of data and accounting for potential loopholes is paramount.<\/p>\n<cite>Brad Arkin, Chief Trust Officer<\/cite><\/blockquote>\n\n\n\n<p><strong>Fast Facts:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In 2024 alone, Salesforce paid over $3 million in bounties to its bug bounty network.<\/li>\n\n\n\n<li>Approximately 480 ethical hackers participated in the program in 2024, disclosing over 4,000 reports of potential vulnerabilities.&nbsp;<\/li>\n\n\n\n<li>Salesforce has awarded individual bounty payouts as high as $60,000.<\/li>\n<\/ul>\n\n\n\n<aside class=\"more-from-block more-from-block--2 alignfull wp-block-newsroom-moreontopic\">\n\t<div class=\"more-from-block__content\">\n\t\t\t\t\t<h4 class=\"more-from-block__title\">Related<\/h4>\n\t\t\n\t\t<div class=\"more-from-block__cards more-from-block__cards--2\"\n\t\t\t\t>\n\t\t\t\n\n<article\t\t\titemscope=\"\"\n\t\titemtype=\"https:\/\/schema.org\/Article\"\n\t\tdata-card-id=\"93018\"\n\t\tclass=\"content-card content-card--large-inline is-entire-area-clickable content-card--is-boxed\"\n\t\t\tdata-clickable-area-link=\"https:\/\/www.salesforce.com\/news\/stories\/tdx-2026-live-blog\/\"\n\t>\n\t\t\t<div class=\"content-card__image-container\" itemprop=\"image\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t\t\t<img width=\"1024\" height=\"576\" src=\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=1024\" class=\"content-card__image\" alt=\"TDX Live Blog 2026\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png 1200w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=768&amp;h=432 768w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=1024&amp;h=576 1024w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=264&amp;h=149 264w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=500&amp;h=281 500w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=678&amp;h=381 678w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=150&amp;h=84 150w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=314&amp;h=177 314w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/TDX-2026-Newsroom-Live-Blog.png?w=343&amp;h=193 343w\" \/>\t\t\t\t\t<\/div>\n\t\n\t<div class=\"content-card__content-container content-card__content-container--style-\">\n\t\t\n\t\t\n\t\t\t\t\t<h3 itemprop=\"headline\" class=\"content-card__title\">\n\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.salesforce.com\/news\/stories\/tdx-2026-live-blog\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-card__title-link\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\tLive from TDX\t\t\t\t<\/a>\t\t\t<\/h3>\n\t\t\n\t\t\t\t\n\t\t\n\t\t\t\t\t<div itemprop=\"readTime\" class=\"content-card__read-time\">\n\t\t\t\t8 min read\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/article>\n\n\n\n<article\t\t\titemscope=\"\"\n\t\titemtype=\"https:\/\/schema.org\/Article\"\n\t\tdata-card-id=\"93106\"\n\t\tclass=\"content-card content-card--large-inline is-entire-area-clickable content-card--is-boxed\"\n\t\t\tdata-clickable-area-link=\"https:\/\/www.salesforce.com\/news\/stories\/agent-fabric-control-plane-announcement\/\"\n\t>\n\t\t\t<div class=\"content-card__image-container\" itemprop=\"image\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t\t\t<img width=\"1024\" height=\"576\" src=\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=1024\" class=\"content-card__image\" alt=\"View of Agent Fabric on a laptop\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png 1200w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=768&amp;h=432 768w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=1024&amp;h=576 1024w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=264&amp;h=149 264w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=500&amp;h=281 500w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=678&amp;h=381 678w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=150&amp;h=84 150w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=314&amp;h=177 314w, https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2026\/04\/Salesforce-Advances-Agent-Fabric_-The-Industrys-Most-Complete-Enterprise-Wide-Agent-Control-Plane-to-Manage-Your-Multi-Vendor-AI-Landscape-1.png?w=343&amp;h=193 343w\" \/>\t\t\t\t\t<\/div>\n\t\n\t<div class=\"content-card__content-container content-card__content-container--style-\">\n\t\t\n\t\t\n\t\t\t\t\t<h3 itemprop=\"headline\" class=\"content-card__title\">\n\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.salesforce.com\/news\/stories\/agent-fabric-control-plane-announcement\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-card__title-link\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\tSalesforce Advances Agent Fabric: New Guided Determinism and Governance Controls to Scale Multi-Vendor AI Faster\u00a0\t\t\t\t<\/a>\t\t\t<\/h3>\n\t\t\n\t\t\t\t\n\t\t\n\t\t\t\t\t<div itemprop=\"readTime\" class=\"content-card__read-time\">\n\t\t\t\t4 min read\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/article>\n\n\t\t<\/div>\n\t\t<noscript>\n<div class=\"pagination-fallback\">\n\n\t\t<a href=\"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts\/84704\/page\/2\/?bc=OTH#section-title\">\n\t\t\tOlder Posts\t\t<\/a>\n\t\t<\/div>\n<\/noscript>\n\t<\/div>\n<\/aside>\n\n\n\n<p><strong>What\u2019s next: <\/strong>Salesforce is continually expanding its Bug Bounty Program, strengthening its ethical hacker community, and monitoring risks to ensure AI agents can be used in a more trusted way.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-explore-further\"><strong>Explore further:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learn more about <a href=\"https:\/\/www.salesforce.com\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salesforce\u2019s Bug Bounty Program<\/a><\/li>\n\n\n\n<li>Read more about how companies can set up their own <a href=\"https:\/\/www.salesforce.com\/news\/stories\/how-to-develop-bug-bounty-programs\/\" target=\"_blank\" rel=\"noreferrer noopener\">bug bounty programs<\/a><\/li>\n\n\n\n<li>Hear from one of Salesforce\u2019s top ethical hackers about his <a href=\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-program-swinnen\/\" target=\"_blank\" rel=\"noreferrer noopener\">bug bounty experience<\/a><\/li>\n\n\n\n<li>Learn more about Salesforce\u2019s <a href=\"https:\/\/security.salesforce.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity initiatives and trust commitment<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><em>To inquire about participating in Salesforce\u2019s invitation-only bug bounty program, contact <\/em><a href=\"mailto:security@salesforce.com\" target=\"_blank\" rel=\"noreferrer noopener\"><em>security@salesforce.com<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Salesforce not only asks ethical hackers to \u201cbreak into\u201d its technology \u2014 it has also invested more than $23 million to date in a Bug Bounty Program that encourages it. The program is a critical part of Salesforce\u2019s strategy to identify security gaps, protect customer data, and address potential risks before malicious actors can exploit [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":84710,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"sf_subhead":"","sf_i18n_disclaimer":false,"_jetpack_memberships_contains_paid_content":false,"alternateThumbnailId":0,"sf_product_cta_id":0,"footnotes":""},"categories":[1],"tags":[],"sf_content_type":[1728],"sf_theme":[1912],"sf_topic":[20528,1737,1726,19141,2290],"sf_product":[],"sf_industry":[],"sf_role":[],"sf_multimedia_asset":[],"sf_location":[1798],"sf_collection":[],"sf_visibility":[],"coauthors":[],"class_list":["post-84704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","sf_content_type-snapshots","sf_theme-digital-transformation","sf_topic-agents","sf_topic-artificial-intelligence","sf_topic-digital-transformation","sf_topic-enterprise-ai","sf_topic-technology-ethics","sf_location-global"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Salesforce Bug Bounty Program Results 2024 - Salesforce<\/title>\n<meta name=\"description\" content=\"Salesforce not only asks ethical hackers to \u201cbreak into\u201d its technology \u2014 it has also invested more than $23 million to date in a Bug Bounty Program that\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"By Paid Invitation: How Hackers Make Salesforce More Secure in the Agentic AI Era\" \/>\n<meta property=\"og:description\" content=\"Salesforce not only asks ethical hackers to \u201cbreak into\u201d its technology \u2014 it has also invested more than $23 million to date in a Bug Bounty Program that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-18T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-18T14:02:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforcenews\" \/>\n<meta name=\"twitter:site\" content=\"@salesforcenews\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"By Paid Invitation: How Hackers Make Salesforce More Secure in the Agentic AI Era\",\"datePublished\":\"2025-02-18T14:00:00+00:00\",\"dateModified\":\"2025-02-18T14:02:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/\"},\"wordCount\":475,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/\",\"url\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/\",\"name\":\"Salesforce Bug Bounty Program Results 2024 - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png\",\"datePublished\":\"2025-02-18T14:00:00+00:00\",\"dateModified\":\"2025-02-18T14:02:08+00:00\",\"description\":\"Salesforce not only asks ethical hackers to \u201cbreak into\u201d its technology \u2014 it has also invested more than $23 million to date in a Bug Bounty Program that\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png\",\"contentUrl\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png\",\"width\":1200,\"height\":675,\"caption\":\"Two hackers collaborate in front of a computer monitor.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/news\/#website\",\"url\":\"https:\/\/www.salesforce.com\/news\/\",\"name\":\"Salesforce\",\"description\":\"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/news\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.salesforce.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2020\/08\/default.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2020\/08\/default.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\/\",\"https:\/\/x.com\/salesforcenews\",\"https:\/\/www.linkedin.com\/company\/salesforce\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Salesforce Bug Bounty Program Results 2024 - Salesforce","description":"Salesforce not only asks ethical hackers to \u201cbreak into\u201d its technology \u2014 it has also invested more than $23 million to date in a Bug Bounty Program that","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/","og_locale":"en_US","og_type":"article","og_title":"By Paid Invitation: How Hackers Make Salesforce More Secure in the Agentic AI Era","og_description":"Salesforce not only asks ethical hackers to \u201cbreak into\u201d its technology \u2014 it has also invested more than $23 million to date in a Bug Bounty Program that","og_url":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce\/","article_published_time":"2025-02-18T14:00:00+00:00","article_modified_time":"2025-02-18T14:02:08+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@salesforcenews","twitter_site":"@salesforcenews","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/"},"author":{"name":"","@id":""},"headline":"By Paid Invitation: How Hackers Make Salesforce More Secure in the Agentic AI Era","datePublished":"2025-02-18T14:00:00+00:00","dateModified":"2025-02-18T14:02:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/"},"wordCount":475,"publisher":{"@id":"https:\/\/www.salesforce.com\/news\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/","url":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/","name":"Salesforce Bug Bounty Program Results 2024 - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png","datePublished":"2025-02-18T14:00:00+00:00","dateModified":"2025-02-18T14:02:08+00:00","description":"Salesforce not only asks ethical hackers to \u201cbreak into\u201d its technology \u2014 it has also invested more than $23 million to date in a Bug Bounty Program that","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.salesforce.com\/news\/stories\/bug-bounty-program-results-2024\/#primaryimage","url":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png","contentUrl":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png","width":1200,"height":675,"caption":"Two hackers collaborate in front of a computer monitor."},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/news\/#website","url":"https:\/\/www.salesforce.com\/news\/","name":"Salesforce","description":"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.","publisher":{"@id":"https:\/\/www.salesforce.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/news\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.salesforce.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2020\/08\/default.jpg","contentUrl":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2020\/08\/default.jpg","width":1200,"height":630,"caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce\/","https:\/\/x.com\/salesforcenews","https:\/\/www.linkedin.com\/company\/salesforce\/"]}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2025\/02\/By-Paid-Invitation_-How-Hackers-Make-Salesforce-More-Secure.png","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/news","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts\/84704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/comments?post=84704"}],"version-history":[{"count":4,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts\/84704\/revisions"}],"predecessor-version":[{"id":84714,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts\/84704\/revisions\/84714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/media\/84710"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/media?parent=84704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/categories?post=84704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/tags?post=84704"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_content_type?post=84704"},{"taxonomy":"sf_theme","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_theme?post=84704"},{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_topic?post=84704"},{"taxonomy":"sf_product","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_product?post=84704"},{"taxonomy":"sf_industry","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_industry?post=84704"},{"taxonomy":"sf_role","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_role?post=84704"},{"taxonomy":"sf_multimedia_asset","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_multimedia_asset?post=84704"},{"taxonomy":"sf_location","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_location?post=84704"},{"taxonomy":"sf_collection","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_collection?post=84704"},{"taxonomy":"sf_visibility","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_visibility?post=84704"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/coauthors?post=84704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}