Skip to content

Commit cab3fcd

Browse files
docs: update security.md (cosmos#5122)
* update security.md * disable link checking for email address --------- Co-authored-by: DimitrisJim <[email protected]>
1 parent a231fea commit cab3fcd

File tree

1 file changed

+9
-73
lines changed

1 file changed

+9
-73
lines changed

SECURITY.md

+9-73
Original file line numberDiff line numberDiff line change
@@ -1,80 +1,16 @@
1-
# Coordinated Vulnerability Disclosure Policy
1+
# How to Report a Security Bug
22

3-
The Cosmos ecosystem believes that strong security is a blend of highly
4-
technical security researchers who care about security and the forward
5-
progression of the ecosystem and the attentiveness and openness of Cosmos core
6-
contributors to help continually secure our operations.
3+
If you believe you have found a security vulnerability in the Interchain Stack, you can report it to our primary vulnerability disclosure channel, the [Cosmos HackerOne Bug Bounty program](https://hackerone.com/cosmos?type=team).
74

8-
> **IMPORTANT**: *DO NOT* open public issues on this repository for security
9-
> vulnerabilities.
5+
<!-- markdown-link-check-disable-next-line -->
6+
If you prefer to report an issue via email, you may send a bug report to [[email protected]]([email protected]) with the issue details, reproduction, impact, and other information. Please submit only one unique email thread per vulnerability. Any issues reported via email are ineligible for bounty rewards.
107

11-
## Scope
8+
Artifacts from an email report are saved at the time the email is triaged. Please note: our team is not able to monitor dynamic content (e.g. a Google Docs link that is edited after receipt) throughout the lifecycle of a report. If you would like to share additional information or modify previous information, please include it in an additional reply as an additional attachment.
129

13-
| Scope |
14-
|---------------------------------------------------------------------------------|
15-
| All [actively supported releases branches](./RELEASES.md#stable-release-policy) |
16-
| main branch |
10+
Please DO NOT file a public issue in this repository to report a security vulnerability.
1711

18-
All actively supported release branches (see table in [section Stable Release Policy in RELEASES.md](./RELEASES.md#stable-release-policy))
19-
of this repository are supported for security updates as well as the **main**
20-
branch. Security vulnerabilities should be reported if the vulnerability can be
21-
reproduced on either one of those.
12+
# Coordinated Vulnerability Disclosure Policy and Safe Harbor
2213

23-
## Reporting a vulnerability
14+
For the most up-to-date version of the policies that govern vulnerability disclosure, please consult the [HackerOne program page](https://hackerone.com/cosmos?type=team&view_policy=true).
2415

25-
| Reporting methods |
26-
|---------------------------------------------------------------|
27-
| [GitHub Private Vulnerability Reporting][gh-private-advisory] |
28-
| [HackerOne bug bounty program][h1] |
29-
30-
All security vulnerabilities can be reported under GitHub's [Private
31-
vulnerability reporting][gh-private-advisory] system. This will open a private
32-
issue for the developers. Try to fill in as much of the questions as possible.
33-
If you are not familiar with the CVSS system for assessing vulnerabilities, just
34-
use the Low/High/Critical severity ratings. A partially filled in report for a
35-
critical vulnerability is still better than no report at all.
36-
37-
Vulnerabilities associated with the **Go, Rust or Protobuf code** of the
38-
repository may be eligible for a [bug bounty][h1]. Please see the bug bounty
39-
page for more details on submissions and rewards. If you think the vulnerability
40-
is eligible for a payout, **report on HackerOne first**.
41-
42-
Vulnerabilities in services and their source codes (JavaScript, web page, Google
43-
Workspace) are not in scope for the bug bounty program, but they are welcome to
44-
be reported in GitHub.
45-
46-
### Guidelines
47-
48-
We require that all researchers:
49-
50-
- Abide by this policy to disclose vulnerabilities, and avoid posting
51-
vulnerability information in public places, including GitHub, Discord,
52-
Telegram, and Twitter.
53-
- Make every effort to avoid privacy violations, degradation of user experience,
54-
disruption to production systems (including but not limited to the Cosmos
55-
Hub), and destruction of data.
56-
- Keep any information about vulnerabilities that you’ve discovered confidential
57-
between yourself and the Cosmos engineering team until the issue has been
58-
resolved and disclosed.
59-
- Avoid posting personally identifiable information, privately or publicly.
60-
61-
If you follow these guidelines when reporting an issue to us, we commit to:
62-
63-
- Not pursue or support any legal action related to your research on this
64-
vulnerability.
65-
- Work with you to understand, resolve and ultimately disclose the issue in a
66-
timely fashion.
67-
68-
### More information
69-
70-
- See [TIMELINE.md] for an example timeline of a disclosure.
71-
- See [DISCLOSURE.md] to see more into the inner workings of the disclosure
72-
process.
73-
- See [EXAMPLES.md] for some of the examples that we are interested in for the
74-
bug bounty program.
75-
76-
[gh-private-advisory]: https://github.com/cosmos/ibc-go/security/advisories/new
77-
[h1]: https://hackerone.com/cosmos
78-
[TIMELINE.md]: https://github.com/cosmos/security/blob/main/TIMELINE.md
79-
[DISCLOSURE.md]: https://github.com/cosmos/security/blob/main/DISCLOSURE.md
80-
[EXAMPLES.md]: https://github.com/cosmos/security/blob/main/EXAMPLES.md
16+
The policy hosted on HackerOne is the official Coordinated Vulnerability Disclosure policy and Safe Harbor for the Interchain Stack, and the teams and infrastructure it supports, and it supersedes previous security policies that have been used in the past by individual teams and projects with targets in scope of the program.

0 commit comments

Comments
 (0)