Skip to content

Latest commit

 

History

History
64 lines (43 loc) · 3.66 KB

SECURITY.md

File metadata and controls

64 lines (43 loc) · 3.66 KB

Enzyme’s Security Policy

This repo describes the Security Policy for Enzyme, including how to disclose vulnerabilities and information about the ongoing Bug Bounty program. We are committed to conduct our Security Policy in a professional and collaborative manner.

Responsible Disclosure

The Enzyme Council has established certain guidelines for responsible disclosure in its protocol. This document outlines the following:

  • Establishing secure contact with a key Technical Council Member
  • What details to provide when making such a disclosure
  • Establishing Secure Contact

The Enzyme Council is committed to working with researchers who securely submit security vulnerability notifications to us, and to resolve those issues quickly.

For all security related issues, Enzyme has an email address where all key security contacts can be reached. Email security at enzyme.finance to let us know that you have something you would like to disclose. Please disclose in your email if the vulnerability you have discovered is critical, high, medium or low severity. Do not however disclose the details of the vulnerability until a member of the Council has responded to you.

In parallel, you may also reach out to key security members on the council and establish a secure line. Again, please do not disclose any details of the vulnerability until you have had a response from one of these parties.

Contacts

Contact Keybase
Mona El Isa (Core Team & Council) @elisafly
Sean Casey (Lead dev & Council ) @dnjc
Sebastian Siemssen (Lead dev & Council) @fubhy
Ivan Herger (Lead dev & Council) @yogivan
Paul Salis (Technical Council) @paulsalis
Matthias Egli (Technical Council) @matthiasegli
Dominic (Technical Council) @dominic91
Nic Munoz McDonald (Technical Council) @niconline
Theophille (Technical Council) @theophile

Once a secure line has been established, a member of the Council will instruct you on the next steps and provide a secure channel for you to disclose details to a small group of people.

Disclosures

When disclosing the issue, your report should include:

  • A Description of suspected vulnerability
  • Steps to reproduce the issue
  • A secure way to contact you
  • Your name and/or colleagues if you wish to be later recognized
  • A suggested patch and/or suggestions to resolve the vulnerability (optional)

Recognition and Bug Bounties

Enzyme has a Bug Bounty program to encourage security researchers to spend time studying the protocol in order to uncover vulnerabilities. We believe these researchers should get fairly compensated for their time and effort, and acknowledged for their valuable contributions. More information about this can be found here.

Rewards

Severity Bounty
Critical Up to $400,000 USDC
High Up to $80,000 USDC
Medium Up to $20,000 USDC
Low Up to $2,000 USDC

Actual payouts are determined by classifying the vulnerability based on its impact and likelihood to be exploited successfully, as well as the process working with the disclosing security researcher.

A detailed description of our bug submissions process as some examples of vulnerabilities we would prioritize, please refer to our bounty page on Immunefi.

Credits

Parts of this policy were inspired by Grin's security policy and DarrenRM’s proposed Responsible Disclosure policy.