Skip to content

Commit d0828f3

Browse files
authoredApr 9, 2021
Minor update to security.md (#6337)
1 parent b13b762 commit d0828f3

File tree

1 file changed

+36
-36
lines changed

1 file changed

+36
-36
lines changed
 

‎SECURITY.md

+36-36
Original file line numberDiff line numberDiff line change
@@ -7,55 +7,55 @@ Policy](https://tendermint.com/security), we operate a [bug
77
bounty](https://hackerone.com/tendermint).
88
See the policy for more details on submissions and rewards, and see "Example Vulnerabilities" (below) for examples of the kinds of bugs we're most interested in.
99

10-
### Guidelines
10+
### Guidelines
1111

1212
We require that all researchers:
1313

1414
* Use the bug bounty to disclose all vulnerabilities, and avoid posting vulnerability information in public places, including Github Issues, Discord channels, and Telegram groups
1515
* Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems (including but not limited to the Cosmos Hub), and destruction of data
16-
* Keep any information about vulnerabilities that you’ve discovered confidential between yourself and the Tendermint Core engineering team until the issue has been resolved and disclosed
16+
* Keep any information about vulnerabilities that you’ve discovered confidential between yourself and the Tendermint Core engineering team until the issue has been resolved and disclosed
1717
* Avoid posting personally identifiable information, privately or publicly
1818

1919
If you follow these guidelines when reporting an issue to us, we commit to:
2020

2121
* Not pursue or support any legal action related to your research on this vulnerability
22-
* Work with you to understand, resolve and ultimately disclose the issue in a timely fashion
22+
* Work with you to understand, resolve and ultimately disclose the issue in a timely fashion
2323

24-
## Disclosure Process
24+
## Disclosure Process
2525

2626
Tendermint Core uses the following disclosure process:
2727

28-
1. Once a security report is received, the Tendermint Core team works to verify the issue and confirm its severity level using CVSS.
29-
2. The Tendermint Core team collaborates with the Gaia team to determine the vulnerability’s potential impact on the Cosmos Hub.
30-
3. Patches are prepared for eligible releases of Tendermint in private repositories. See “Supported Releases” below for more information on which releases are considered eligible.
31-
4. If it is determined that a CVE-ID is required, we request a CVE through a CVE Numbering Authority.
28+
1. Once a security report is received, the Tendermint Core team works to verify the issue and confirm its severity level using CVSS.
29+
2. The Tendermint Core team collaborates with the Gaia team to determine the vulnerability’s potential impact on the Cosmos Hub.
30+
3. Patches are prepared for eligible releases of Tendermint in private repositories. See “Supported Releases” below for more information on which releases are considered eligible.
31+
4. If it is determined that a CVE-ID is required, we request a CVE through a CVE Numbering Authority.
3232
5. We notify the community that a security release is coming, to give users time to prepare their systems for the update. Notifications can include forum posts, tweets, and emails to partners and validators, including emails sent to the [Tendermint Security Mailing List](https://berlin.us4.list-manage.com/subscribe?u=431b35421ff7edcc77df5df10&id=3fe93307bc).
33-
6. 24 hours following this notification, the fixes are applied publicly and new releases are issued.
34-
7. Cosmos SDK and Gaia update their Tendermint Core dependencies to use these releases, and then themselves issue new releases.
35-
8. Once releases are available for Tendermint Core, Cosmos SDK and Gaia, we notify the community, again, through the same channels as above. We also publish a Security Advisory on Github and publish the CVE, as long as neither the Security Advisory nor the CVE include any information on how to exploit these vulnerabilities beyond what information is already available in the patch itself.
36-
9. Once the community is notified, we will pay out any relevant bug bounties to submitters.
37-
10. One week after the releases go out, we will publish a post with further details on the vulnerability as well as our response to it.
33+
6. 24 hours following this notification, the fixes are applied publicly and new releases are issued.
34+
7. Cosmos SDK and Gaia update their Tendermint Core dependencies to use these releases, and then themselves issue new releases.
35+
8. Once releases are available for Tendermint Core, Cosmos SDK and Gaia, we notify the community, again, through the same channels as above. We also publish a Security Advisory on Github and publish the CVE, as long as neither the Security Advisory nor the CVE include any information on how to exploit these vulnerabilities beyond what information is already available in the patch itself.
36+
9. Once the community is notified, we will pay out any relevant bug bounties to submitters.
37+
10. One week after the releases go out, we will publish a post with further details on the vulnerability as well as our response to it.
3838

39-
This process can take some time. Every effort will be made to handle the bug in as timely a manner as possible, however it's important that we follow the process described above to ensure that disclosures are handled consistently and to keep Tendermint Core and its downstream dependent projects--including but not limited to Gaia and the Cosmos Hub--as secure as possible.
39+
This process can take some time. Every effort will be made to handle the bug in as timely a manner as possible, however it's important that we follow the process described above to ensure that disclosures are handled consistently and to keep Tendermint Core and its downstream dependent projects--including but not limited to Gaia and the Cosmos Hub--as secure as possible.
4040

41-
### Example Timeline
41+
### Example Timeline
4242

43-
The following is an example timeline for the triage and response. The required roles and team members are described in parentheses after each task; however, multiple people can play each role and each person may play multiple roles.
43+
The following is an example timeline for the triage and response. The required roles and team members are described in parentheses after each task; however, multiple people can play each role and each person may play multiple roles.
4444

45-
#### > 24 Hours Before Release Time
45+
#### 24+ Hours Before Release Time
4646

47-
1. Request CVE number (ADMIN)
48-
2. Gather emails and other contact info for validators (COMMS LEAD)
47+
1. Request CVE number (ADMIN)
48+
2. Gather emails and other contact info for validators (COMMS LEAD)
4949
3. Create patches in a private security repo, and ensure that PRs are open targeting all relevant release branches (TENDERMINT ENG, TENDERMINT LEAD)
50-
4. Test fixes on a testnet (TENDERMINT ENG, COSMOS ENG)
51-
5. Write “Security Advisory” for forum (TENDERMINT LEAD)
50+
4. Test fixes on a testnet (TENDERMINT ENG, COSMOS SDK ENG)
51+
5. Write “Security Advisory” for forum (TENDERMINT LEAD)
5252

5353
#### 24 Hours Before Release Time
5454

55-
1. Post “Security Advisory” pre-notification on forum (TENDERMINT LEAD)
56-
2. Post Tweet linking to forum post (COMMS LEAD)
57-
3. Announce security advisory/link to post in various other social channels (Telegram, Discord) (COMMS LEAD)
58-
4. Send emails to validators or other users (PARTNERSHIPS LEAD)
55+
1. Post “Security Advisory” pre-notification on forum (TENDERMINT LEAD)
56+
2. Post Tweet linking to forum post (COMMS LEAD)
57+
3. Announce security advisory/link to post in various other social channels (Telegram, Discord) (COMMS LEAD)
58+
4. Send emails to validators or other users (PARTNERSHIPS LEAD)
5959

6060
#### Release Time
6161

@@ -65,36 +65,36 @@ The following is an example timeline for the triage and response. The required r
6565
4. Post “Security releases” on forum (TENDERMINT LEAD)
6666
5. Post new Tweet linking to forum post (COMMS LEAD)
6767
6. Remind everyone via social channels (Telegram, Discord) that the release is out (COMMS LEAD)
68-
7. Send emails to validators or other users (COMMS LEAD)
69-
8. Publish Security Advisory and CVE, if CVE has no sensitive information (ADMIN)
68+
7. Send emails to validators or other users (COMMS LEAD)
69+
8. Publish Security Advisory and CVE, if CVE has no sensitive information (ADMIN)
7070

7171
#### After Release Time
7272

7373
1. Write forum post with exploit details (TENDERMINT LEAD)
74-
2. Approve pay-out on HackerOne for submitter (ADMIN)
74+
2. Approve pay-out on HackerOne for submitter (ADMIN)
7575

7676
#### 7 Days After Release Time
7777

78-
1. Publish CVE if it has not yet been published (ADMIN)
78+
1. Publish CVE if it has not yet been published (ADMIN)
7979
2. Publish forum post with exploit details (TENDERMINT ENG, TENDERMINT LEAD)
8080

8181
## Supported Releases
8282

83-
The Tendermint Core team commits to releasing security patch releases for both the latest minor release as well for the major/minor release that the Cosmos Hub is running.
83+
The Tendermint Core team commits to releasing security patch releases for both the latest minor release as well for the major/minor release that the Cosmos Hub is running.
8484

85-
If you are running older versions of Tendermint Core, we encourage you to upgrade at your earliest opportunity so that you can receive security patches directly from the Tendermint repo. While you are welcome to backport security patches to older versions for your own use, we will not publish or promote these backports.
85+
If you are running older versions of Tendermint Core, we encourage you to upgrade at your earliest opportunity so that you can receive security patches directly from the Tendermint repo. While you are welcome to backport security patches to older versions for your own use, we will not publish or promote these backports.
8686

8787
## Scope
8888

8989
The full scope of our bug bounty program is outlined on our [Hacker One program page](https://hackerone.com/tendermint). Please also note that, in the interest of the safety of our users and staff, a few things are explicitly excluded from scope:
9090

91-
* Any third-party services
92-
* Findings from physical testing, such as office access
91+
* Any third-party services
92+
* Findings from physical testing, such as office access
9393
* Findings derived from social engineering (e.g., phishing)
9494

95-
## Example Vulnerabilities
95+
## Example Vulnerabilities
9696

97-
The following is a list of examples of the kinds of vulnerabilities that we’re most interested in. It is not exhaustive: there are other kinds of issues we may also be interested in!
97+
The following is a list of examples of the kinds of vulnerabilities that we’re most interested in. It is not exhaustive: there are other kinds of issues we may also be interested in!
9898

9999
### Specification
100100

@@ -154,5 +154,5 @@ Attacks may come through the P2P network or the RPC layer:
154154

155155
### Light Client
156156

157-
* Core verification
157+
* Core verification
158158
* Bisection/sequential algorithms

0 commit comments

Comments
 (0)
Please sign in to comment.