Skip to content

Commit 1ef466f

Browse files
authored
Merge pull request #438 from rsksmart/master-qa-sync
Master qa sync
2 parents a288612 + e8e14f3 commit 1ef466f

File tree

3 files changed

+73
-18
lines changed

3 files changed

+73
-18
lines changed

.github/copilot-instructions.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
When performing a code review, apply the checks in the prompts/review-code.prompt.md file.
2+
3+
When performing a code review, focus on readability and avoid nested ternary operators.
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
agent: "agent"
3+
description: "Perform a comprehensive code review"
4+
---
5+
6+
## Role
7+
8+
You're a senior software engineer conducting a thorough code review. Provide constructive, actionable feedback.
9+
10+
## Review Areas
11+
12+
Analyze the selected code for:
13+
14+
1. **Security Issues**
15+
16+
- Input validation and sanitization
17+
- Data exposure risks
18+
- Injection vulnerabilities
19+
- OWASP Top 10 risks
20+
21+
2. **Performance & Efficiency**
22+
23+
- Algorithm complexity
24+
- Memory usage patterns
25+
- Database query optimization
26+
- Unnecessary computations
27+
28+
3. **Code Quality**
29+
30+
- Readability and maintainability
31+
- Proper naming conventions
32+
- Function/class size and responsibility
33+
- Code duplication
34+
35+
4. **Architecture & Design**
36+
37+
- Design pattern usage
38+
- Separation of concerns
39+
- Dependency management
40+
- Error handling strategy
41+
42+
5. **Testing & Documentation**
43+
- Test coverage and quality
44+
- Documentation completeness
45+
- Comment clarity and necessity
46+
47+
## Output Format
48+
49+
Provide feedback as:
50+
51+
**🔴 Critical Issues** - Must fix before merge
52+
**🟡 Suggestions** - Improvements to consider
53+
**✅ Good Practices** - What's done well
54+
55+
For each issue:
56+
57+
- Specific line references
58+
- Clear explanation of the problem
59+
- Suggested solution with code example
60+
- Rationale for the change
61+
62+
Focus on: ${input:focus:Any specific areas to emphasize in the review?}
63+
64+
Be constructive and educational in your feedback.

SECURITY.md

Lines changed: 6 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,19 @@
1-
# Liquidity Bridge Contract Security Process
1+
# RootstockLabs's Security Process
22

33
We are committed to conduct our security process in a professional and civil manner. Public shaming, under-reporting or misrepresentation of vulnerabilities will not be tolerated.
44

55
## Responsible Disclosure
66

7-
For all security related issues, Liquidity Bridge Contract has two main points of contact. Reach us at <security@rootstocklabs.com> or refer to our [Bug Bounty Program](https://www.rootstocklabs.com/bug-bounty-program). **Do not open up a GitHub issue if the bug is a security vulnerability**
7+
For all security related issues, RootstockLabs has two main points of contact. Reach us at <security@rootstocklabs.com> or refer to our [Bug Bounty Program](https://www.rootstocklabs.com/bug-bounty-program/). **Do not open up a GitHub issue if the bug is a security vulnerability**
88

99
**Ensure the bug was not already reported** by searching on GitHub under [Issues](https://github.com/rsksmart/liquidity-bridge-contract/issues).
1010

11-
## Vulnerability Handling
11+
## Disclosure Policy
1212

13-
### Response Time
13+
- Follow Immunefi's [disclosure guidelines](https://immunefi.com/responsible-publication/).
14+
- Public disclosure of a vulnerability makes it ineligible for a bounty.
1415

15-
RootstockLabs will make a best effort to meet the following response times for reported vulnerabilities:
16-
17-
- Time to first response (from report submit) - 5 business days
18-
- Time to triage (from report submit) - 7 business days
19-
- Time to bounty (from triage) - 15 business days
20-
21-
We’ll try to keep you informed about our progress throughout the process.
22-
23-
### Disclosure Policy
24-
25-
- Follow HackerOne's [disclosure guidelines](https://www.hackerone.com/disclosure-guidelines).
26-
- Public disclosure of a vulnerability makes it ineligible for a bounty. If the user reports the vulnerability to other security teams (e.g. Ethereum or ETC) but reports to RootstockLabs with considerable delay, then RootstockLabs may reduce or cancel the bounty.
27-
28-
For more information check RootstockLabs bounty program policy at [HackerOne](https://hackerone.com/rootstocklabs)
16+
For more information, check RootstockLabs bounty program policy at [Immunefi](https://immunefi.com/bug-bounty/rootstocklabs/information)
2917

3018
## Public Keys
3119

0 commit comments

Comments
 (0)