Skip to content

chore: add SECURITY.md #2690

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 4 commits into
base: main
Choose a base branch
from
Open

chore: add SECURITY.md #2690

wants to merge 4 commits into from

Conversation

anton-trunov
Copy link
Member

Issue

Closes #423.

@anton-trunov anton-trunov added this to the v1.6.6 milestone Apr 8, 2025
@anton-trunov anton-trunov requested a review from a team as a code owner April 8, 2025 15:27
@anton-trunov anton-trunov requested a review from Mobyman April 8, 2025 15:28
Copy link
Contributor

@jubnzv jubnzv left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this document resembles an incomplete bug bounty program description for the Tact ecosystem rather than a security policy for a single project, as it covers multiple projects and is quite comprehensive.

Overall, it seems reasonable, but I would add more specific details:

  • Define severity levels: Needed to prevent misinterpretation by reporters.
  • Specify bounty rewards: Without incentives, critical vulnerabilities (which could financially benefit attackers) may go unreported. Rewards should reflect severity.
  • Formalize response timelines: For instance, "We guarantee a response within N business days."


- The Tact compiler, including the TypeScript wrappers it generates,
- The Tact standard library (`stdlib`),
- Developer tooling: Tact's CLI, VS Code plugin, and the Tact [language server](https://github.com/tact-lang/tact-language-server),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would create a complete list with links to github repos for clarity.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if I got it. CLI or CI? No mistake here?


Your report should include:

- A description of the vulnerability.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: Let's make formatting of the lists more consistent (e.g. capitalized, no trailing comma)


## Out of scope

Only the targets listed under in-scope are part of the security policy. This means that, for example, our infrastructure, such as webpages, is not part of the scope.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would explicitly specify what is out of scope:

Suggested change
Only the targets listed under in-scope are part of the security policy. This means that, for example, our infrastructure, such as webpages, is not part of the scope.
Only the targets listed under "in-scope" are part of the security policy.
The following are considered out of scope:
- Server infrastructure (TODO: backend components, static webpages, ...)
- ...


## In scope

This policy applies to:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How about CI? And npm repositories? These are very common attack vectors.

- Web-based compiler services, such as [TON Web IDE](https://ide.ton.org),
- Smart contract generation and deployment utilities.

A security issue, in this case, may stem from miscompilation, incorrect documentation description, incorrect language server, editor plugin, or TON Web IDE suggestions, which can lead to monetary loss if an affected smart contract is deployed in the mainnet and a malicious third party interacts with it.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would replace this with severity level descriptions. Attacks leading to DoS attacks, gas draining or similar issues are problematic but definitely not critical.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, would be nice to have a bullet-list here as well.

@anton-trunov
Copy link
Member Author

@jubnzv Thanks for your detailed review, I really appreciate it. I'll split the current PR in two: there will be a simpler SECURITY.md file for the GitHub setup. We will also add similar files to all the relevant projects in the tact-lang GH org. Plus, the extended version of this PR will be published on the TON Studio website and/or aggregators like HackenProof.

@novusnota novusnota modified the milestones: v1.6.6, Infra: 2025-04 Apr 16, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add SECURITY.md
4 participants