You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/resources/security.md
+18-28Lines changed: 18 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,43 +9,33 @@ description: Security Policies for Threshold Network
9
9
Find bugs and vulnerabilities on Threshold Network and get paid up to $500,000
10
10
{% endhint %}
11
11
12
-
If you identify vulnerabilities with _any_ Threshold Network code, please email [[email protected]](mailto:[email protected]) with relevant information to your findings. We will work with researchers to coordinate vulnerability disclosure between our stakers, partners, and users to ensure the successful mitigation of vulnerabilities.
12
+
### Bug Bounty Program
13
13
14
-
Throughout the reporting process, we expect researchers to honor an embargo period that may vary depending on the severity of the disclosure. This ensures that we have the opportunity to fix any issues, identify further issues (if any), and inform our users.
14
+
Threshold Network has a [Bug Bounty program with Immunefi](https://immunefi.com/bounty/thresholdnetwork/).
15
15
16
-
Sometimes vulnerabilities are more sensitive in nature and require extra precautions. We are happy to work together to use a more secure medium, such as Signal. Email [[email protected]](mailto:[email protected]) and we will coordinate a communication channel that we're both comfortable with.
16
+
The details for the Bug Bounty are maintained and updated at the [Immunefi Threshold page](https://immunefi.com/bounty/thresholdnetwork/). There you can explore the assets in scope of the Bounty and the different rewards by threat level. As a guide, the initial bounty program launched with the following rewards according to the severity of the threats found:
17
17
18
-
A great place to begin your research is by working on our testnet. Please see our [documentation](../extras/broken-reference/) to get started. We ask that you please respect network machines and their owners. If you find a vulnerability that you suspect has given you access to a machine against the owner's permission, stop what you're doing and immediately email [[email protected]](mailto:[email protected]).
18
+
Smart Contracts
19
19
20
-
The Threshold team will make its best effort to respond to a new report **within 48 hours**. This response may be a simple acknowledgment that the report was received or may be an initial assessment from the team. Unless the report is assessed as irrelevant or incorrect, this response will include expected next steps and communication time frames from the Threshold team.
20
+
* Critical Level: USD $100,000 to USD $500,000
21
+
* High Level: USD $10,000 to USD $50,000
22
+
* Medium Level: USD $1,000 to USD $5,000
23
+
* Low Level: USD $1,000
21
24
22
-
The Threshold team will try to make an initial assessment of a bug's relevance, severity, and exploitability, and communicate this back to the reporter.
25
+
Websites and Applications
23
26
24
-
The Threshold DAO does have a bug bounty available, which is dispensed on a case-by-case basis.
27
+
* Critical Level: USD $10,000 to USD $25,000
28
+
* High Level: USD $1,000 to USD $10,000
29
+
* Medium Level: USD $1,000
25
30
26
-
## Bug Bounty Program
31
+
A great place to begin your research is by working on our testnet. Please see our [documentation](https://docs.threshold.network/) to get started. We ask that you please respect network machines and their owners. If you find a vulnerability that you suspect has given you access to a machine against the owner's permission, stop what you're doing and create a report using the immunefi dashboard for researchers.
27
32
28
-
The following Bug Bounty amounts were approved by the DAO in the [TIP-041](https://forum.threshold.network/t/tip-041-establish-a-bug-bounty-program/453) proposal:
33
+
Rewards are distributed according to the impact of the vulnerability based on the [Immunefi Vulnerability Severity Classification System V2.3](https://immunefi.com/immunefi-vulnerability-severity-classification-system-v2-3/). This is a simplified 4-level scale, with separate scales for websites/apps, smart contracts, and blockchains/DLTs, focusing on the impact of the vulnerability reported.
29
34
30
-
* Critical: Up to $500,000 in T tokens.
31
-
* High: Up to $50,000 in T tokens.
32
-
* Medium: Up to $5,000 in T tokens.
33
-
* Low: Up to $500 in T tokens.
35
+
### Reporting a Vulnerability Not Covered by the Bug Bounty Program
34
36
35
-
The following attacks are excluded from the Bug Bounty program:
37
+
Please, verify the list of assets in-scope and out-of-scope available as part of the [Threshold Bug Bounty details](https://immunefi.com/bounty/thresholdnetwork/). Additionally, security researchers are encouraged to submit issues outside of the outlined Impacts and Assets in Scope. If you can demonstrate a critical impact on code in production for an asset not in scope, Threshold DAO encourages you to submit your bug report using the “primacy of impact exception” asset in Immunefi.
36
38
37
-
* Attacks that the reporter has already exploited themselves, leading to damage.
38
-
* Attacks requiring access to leaked keys/credentials.
Threshold DAO will try to make an initial assessment of a bug's relevance, severity, and exploitability, and communicate this back to the reporter. The Threshold DAO will compensate findings on a case-by-case basis. We value security researchers and we encourage you to contact us to discuss your findings.
42
40
43
-
The following activities are prohibited by this bug bounty program:
44
-
45
-
* Any testing with mainnet or public testnet contracts; all testing should be done on private testnets.
46
-
* Attempting phishing or other social engineering attacks against our contributors and/or users.
47
-
* Any denial of service attacks.
48
-
* Automated testing of services that generates significant amounts of traffic.
49
-
* Public disclosure of an unpatched vulnerability in an embargoed bounty.
50
-
51
-
Rewards are distributed according to the impact of the vulnerability based on the [Immunefi Vulnerability Severity Classification System V2.2](https://immunefi.com/immunefi-vulnerability-severity-classification-system-v2-2/). This is a simplified 5-level scale, with separate scales for websites/apps, smart contracts, and blockchains/DLTs, focusing on the impact of the vulnerability reported.
41
+
We also ask all researchers to please submit their reports in English.
0 commit comments