mirror of
https://github.com/monero-project/meta.git
synced 2024-12-22 11:39:22 +00:00
Merge pull request #176 from anonimal/VRP
VRP: updates to incident response + post-release disclosure process
This commit is contained in:
commit
ab77989329
1 changed files with 2 additions and 2 deletions
|
@ -75,7 +75,7 @@ PGP fingerprint = 1218 6272 CD48 E253 9E2D D29B 66A7 6ECF 9144 09F1
|
|||
6. Establish severity of vulnerability:
|
||||
- a. HIGH: impacts network as a whole, has potential to break entire monero/kovri network, results in the loss of monero, or is on a scale of great catastrophe
|
||||
- b. MEDIUM: impacts individual nodes, routers, wallets, or must be carefully exploited
|
||||
- c. LOW: is not easily exploitable
|
||||
- c. LOW: is not easily exploitable or is low impact
|
||||
- d. If there are any disputes regarding bug severity, the Monero Response team will ultimately define bug severity
|
||||
|
||||
7. Respond according to the severity of the vulnerability:
|
||||
|
@ -106,7 +106,7 @@ PGP fingerprint = 1218 6272 CD48 E253 9E2D D29B 66A7 6ECF 9144 09F1
|
|||
1. Response Team has 90 days to fulfill all points within section III
|
||||
|
||||
2. If the Incident Response process in section III is successfully completed:
|
||||
- a. Response Manager contacts researcher and asks if researcher wishes for credit
|
||||
- a. Researcher decides whether or not to opt out of receiving name/handle/organization credit. By default, the researcher will receive name/handle/organization credit.
|
||||
- i. If bounty is applicable, release bounty to the researcher as defined in section "Bounty Distribution"
|
||||
- b. Finalize vulnerability announcement draft and include the following:
|
||||
- i. Project name and URL
|
||||
|
|
Loading…
Reference in a new issue