Skip to content

Commit 732f871

Browse files
authored
Add SECURITY.md for vulnerability reporting and policies
Added a comprehensive security policy document outlining supported versions, vulnerability reporting procedures, response timelines, severity classifications, and best practices for contributors.
1 parent be13d6d commit 732f871

1 file changed

Lines changed: 98 additions & 0 deletions

File tree

SECURITY.md

Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,98 @@
1+
# Security Policy
2+
3+
## Supported Versions
4+
5+
Security updates are provided for the following versions of Rampage L1:
6+
7+
| Version | Supported |
8+
| ------- | ------------------ |
9+
| main | :white_check_mark: |
10+
| < v1.5 | :x: |
11+
12+
As the project is currently in pre-release (v1.5 prototype), all active development occurs on `main`. Security patches will be applied directly to the main branch and tagged accordingly.
13+
14+
## Reporting a Vulnerability
15+
16+
**DO NOT report security vulnerabilities through public GitHub issues.**
17+
18+
If you discover a security vulnerability in Rampage L1, please report it responsibly through one of the following private channels:
19+
20+
### Private Disclosure
21+
22+
1. **GitHub Security Advisories (Preferred):** Use the [Security Advisories](https://github.com/RampageRPM1/rampage/security/advisories/new) feature to privately report vulnerabilities directly to the maintainer.
23+
24+
2. **Direct Contact:** Reach out to the project maintainer, Shea Patrick Kastl, through the GitHub profile associated with this repository.
25+
26+
### What to Include in Your Report
27+
28+
Please include as much of the following information as possible:
29+
30+
- Type of vulnerability (e.g., buffer overflow, SQL injection, consensus bypass, double-spend, Sybil attack, etc.)
31+
- Full paths of source file(s) related to the vulnerability
32+
- Step-by-step instructions to reproduce the issue
33+
- Proof-of-concept or exploit code (if possible)
34+
- Impact assessment: what an attacker could gain from exploiting this vulnerability
35+
- Suggested remediation (optional but appreciated)
36+
37+
## Response Timeline
38+
39+
We are committed to the following response process:
40+
41+
- **Acknowledgment:** Within 72 hours of receiving your report
42+
- **Initial Assessment:** Within 7 days
43+
- **Remediation Plan:** Within 30 days for critical issues
44+
- **Patch Release:** As quickly as feasible depending on severity
45+
46+
## Severity Classification
47+
48+
| Severity | Description | Examples |
49+
|----------|-------------|----------|
50+
| Critical | Consensus breaking, network halt, fund theft | Double-spend, validator key compromise |
51+
| High | Significant impact to chain security or data integrity | Governance manipulation, block forging |
52+
| Medium | Limited impact, requires specific conditions | DoS vectors, minor data leaks |
53+
| Low | Minimal impact, informational | Configuration warnings, log exposure |
54+
55+
## Disclosure Policy
56+
57+
We follow a **coordinated disclosure** model:
58+
59+
1. Reporter submits vulnerability privately.
60+
2. Maintainer acknowledges and begins investigation.
61+
3. Fix is developed and tested privately.
62+
4. Patch is released.
63+
5. A security advisory is published crediting the reporter (unless anonymity is requested).
64+
6. A minimum of 90 days will pass before full public disclosure for critical/high severity issues.
65+
66+
## Bug Bounty
67+
68+
Rampage L1 does not currently operate a formal bug bounty program. However, significant vulnerability discoveries may be acknowledged publicly (with permission) and recognized in the project's NOTICE file.
69+
70+
## Scope
71+
72+
### In Scope
73+
74+
- Consensus mechanism vulnerabilities
75+
- Governance bypass or manipulation
76+
- Validator key management issues
77+
- IBC security vulnerabilities in Rampage's implementation
78+
- Smart contract / module vulnerabilities
79+
- Denial of service attacks against the network
80+
- Data integrity issues
81+
82+
### Out of Scope
83+
84+
- Third-party library vulnerabilities not directly exploitable in Rampage context
85+
- Social engineering attacks
86+
- Physical security issues
87+
- Issues in forked or derivative projects not maintained by this repository
88+
89+
## Security Best Practices for Contributors
90+
91+
- Never commit private keys, mnemonics, or API secrets to the repository
92+
- Use environment variables for all sensitive configuration
93+
- All cryptographic implementations must use audited, well-established libraries
94+
- New consensus-critical code requires explicit review from the core maintainer before merge
95+
96+
---
97+
98+
*This security policy is maintained by Shea Patrick Kastl. Last reviewed: 2025.*

0 commit comments

Comments
 (0)