Skip to content

Commit 3ed292e

Browse files
authored
Merge pull request #139 from Luna5-threshold/patch-2
Update security policies with bug bounty info
2 parents 01ff63f + 77710c8 commit 3ed292e

File tree

1 file changed

+18
-32
lines changed

1 file changed

+18
-32
lines changed

SECURITY.md

Lines changed: 18 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,46 +1,32 @@
11
# Security Policy
22

3-
## Reporting a Vulnerability
4-
5-
If you identify vulnerabilities with any Threshold Network code, please email `[email protected]` with relevant information to your findings. We will work with researchers to coordinate vulnerability disclosure between our stakers, partners, and users to ensure the successful mitigation of vulnerabilities.
6-
7-
Throughout the reporting process, we expect researchers to honor an embargo period that may vary depending on the severity of the disclosure. This ensures that we have the opportunity to fix any issues, identify further issues (if any), and inform our users.
8-
9-
Sometimes vulnerabilities are more sensitive in nature and require extra precautions. We are happy to work together to use a more secure medium, such as Signal. Email [email protected] and we will coordinate a communication channel that we're both comfortable with.
10-
11-
A great place to begin your research is by working on our testnet. Please see our [documentation](https://docs.threshold.network) to get started. We ask that you please respect network machines and their owners. If you find a vulnerability that you suspect has given you access to a machine against the owner's permission, stop what you're doing and immediately email `[email protected]`.
3+
## Bug Bounty Program
124

13-
The Threshold team will make a best effort to respond to a new report **within 48 hours**. This response may be a simple acknowledgement that the report was received, or may be an initial assessment from the team. Unless the report is assessed as irrelevant or incorrect, this response will include expected next steps and communication time frames from the Threshold team.
5+
Threshold Network has a [Bug Bounty program with Immunefi](https://immunefi.com/bounty/thresholdnetwork/).
146

15-
The Threshold team will try to make an initial assessment of a bug's relevance, severity, and exploitability, and communicate this back to the reporter.
7+
The details for the Bug Bounty are maintained and updated at the [Immunefi Threshold page](https://immunefi.com/bounty/thresholdnetwork/). There you can explore the assets in scope for the bounty and the different rewards by threat level. As a guide, the initial bounty program launched with the following rewards according to the severity of the threats found:
168

17-
The Threshold DAO does have a bug bounty available, which is dispensed on a case-by-case basis.
9+
Smart Contracts
1810

19-
## Bug Bounty Program
11+
- Critical Level: USD $100,000 to USD $500,000
12+
- High Level: USD $10,000 to USD $50,000
13+
- Medium Level: USD $1,000 to USD $5,000
14+
- Low Level: USD $1,000
2015

21-
The following Bug Bounty amounts were approved by the DAO in [TIP-041](https://forum.threshold.network/t/tip-041-establish-a-bug-bounty-program/453) proposal:
16+
Websites and Applications
2217

23-
- Critical: Up to $500,000 in T tokens.
24-
- High: Up to $50,000 in T tokens.
25-
- Medium: Up to $5,000 in T tokens.
26-
- Low: Up to $500 in T tokens.
18+
- Critical Level: USD $10,000 to USD $25,000
19+
- High Level: USD $1,000 to USD $10,000
20+
- Medium Level: USD $1,000
2721

28-
The following attacks are excluded from the Bug Bounty program:
22+
A great place to begin your research is by working on our testnet. Please see our [documentation](https://docs.threshold.network) to get started. We ask that you please respect network machines and their owners. If you find a vulnerability that you suspect has given you access to a machine against the owner's permission, stop what you're doing and create a report using the Immunefi dashboard for researchers.
2923

30-
- Attacks that the reporter has already exploited themselves, leading to damage.
31-
- Attacks requiring access to leaked keys/credentials.
32-
- Basic economic governance attacks (e.g. 51% attack).
33-
- Lack of liquidity.
34-
- Sybil attacks.
24+
Rewards are distributed according to the impact of the vulnerability based on the [Immunefi Vulnerability Severity Classification System V2.3](https://immunefi.com/immunefi-vulnerability-severity-classification-system-v2-3/). This is a simplified 4-level scale, with separate scales for websites/apps, smart contracts, and blockchains/DLTs, focusing on the impact of the vulnerability reported.
3525

36-
The following activities are prohibited by this bug bounty program:
26+
## Reporting a Vulnerability Not Covered by the Bug Bounty Program
3727

38-
- Any testing with mainnet or public testnet contracts; all testing should be done on private testnets.
39-
- Attempting phishing or other social engineering attacks against our contributors and/or users.
40-
- Any denial of service attacks.
41-
- Automated testing of services that generates significant amounts of traffic.
42-
- Public disclosure of an unpatched vulnerability in an embargoed bounty.
28+
Please verify the list of assets in-scope and out-of-scope available as part of the [Threshold Bug Bounty details](https://immunefi.com/bounty/thresholdnetwork/). Additionally, security researchers are encouraged to submit issues outside of the outlined "Impacts" and "Assets in Scope". If you can demonstrate a critical impact on code in production for an asset not in scope, Threshold DAO encourages you to submit your bug report using the “primacy of impact exception” asset in Immunefi.
4329

44-
Rewards are distributed according to the impact of the vulnerability based on the [Immunefi Vulnerability Severity Classification System V2.2](https://immunefi.com/immunefi-vulnerability-severity-classification-system-v2-2/). This is a simplified 5-level scale, with separate scales for websites/apps, smart contracts, and blockchains/DLTs, focusing on the impact of the vulnerability reported.
30+
Threshold DAO will try to make an initial assessment of a bug's relevance, severity, and exploitability, and communicate this back to the reporter. The Threshold DAO will compensate important findings on a case-by-case basis. We value security researchers and we encourage you to contact us to discuss your findings.
4531

46-
Threshold DAO is currently in the process of establishing a Bug Bounty program on Immunefi.
32+
We also ask all researchers to please submit their reports in English.

0 commit comments

Comments
 (0)