The frustrated researcher, who failed to get an adequate response from Facebook's security team and so hacked Mark Zuckerberg's page to get their attention, is not going to receive a bug bounty for his discovery the social network has confirmed.
In a posting made last night on the social network's security page, Facebook chief security officer Joe Sullivan admitted that his team made mistakes in its interactions with Palestinian researcher Khalil Shreateh and failed in its communication with him.
As a result, the site is going to make some changes in how it responds to potential vulnerability reports.
"We should have explained to this researcher that his initial messages to us did not give us enough detail to allow us to replicate the problem. The breakdown here was not about a language barrier or a lack of interest — it was purely because the absence of detail made it look like yet another misrouted user report."
"We will make two changes as a result of this case: (1) We will improve our email messaging to make sure we clearly articulate what we need to validate a bug, and (2) we will update our whitehat page with more information on the best ways to submit a bug report."
From the looks of things, it's true that Facebook didn't really try very hard to explain the level of detail it required from Shreateh to confirm that a flaw existed on its social network.
He made two attempts to tell Facebook about the flaw, pointing them to a URL where he had managed to post a message containing a link to an Enrique Iglesias video on the wall of Sarah Goodin, a woman who had gone to college with Zuckerberg.
Facebook's security team clearly failed to understand the scope of what Shreateh was attempting to report, but that should have been the cue for them to point him towards detailed directions of the type of information they required to properly investigate a report of a bug or vulnerability.
Instead, Facebook's curt unhelpful response to Shreateh left him vaguely threatening to post on Mark Zuckerberg's wall.
(Something he said he would not do because he "respected people's privacy", but did actually do in the end.
Joe Sullivan says, however, that Facebook will not change its policy of refusing to pay rewards to security researchers who test vulnerabilities against real Facebook users:
"It is never acceptable to compromise the security or privacy of other people. In this case, the researcher could have sent a more detailed report (like the video he later published), and he could have used one of our test accounts to confirm the bug."
And you know what? I agree with Facebook. Shreateh shouldn't have messed with anyone's Facebook page without their permission. Yes, we should be grateful that he didn't abuse the flaw in a malicious way, or sell details of the bug to online criminals who could certainly have used it to their advantage.
But it would have been better if he had only used test accounts to show how the flaw worked, and if he was frustrated by Facebook's less-than-great way of dealing with him sought the assistance of the media or other researchers to underline the importance of what he was trying to report.
Does that mean Shreateh shouldn't receive a reward? Well, although many will feel he does deserve to receive a bounty for finding a bug - it doesn't look like Facebook is prepared to make an exception and shift on this one.
Let's hope that this unfortunate interaction doesn't prevent Shreateh from responsibly reporting flaws to Facebook in future, and - if he does - let's hope that he receives the bug bounty reward that he will deserve.
If you are on Facebook, and want to be kept updated with news about security and privacy risks, and tips on how to protect yourself online, join the Graham Cluley Security News Facebook page.