Skip to content

Commit 56e9e30

Browse files
committed
docs: update security policy
1 parent 609a200 commit 56e9e30

File tree

1 file changed

+29
-35
lines changed

1 file changed

+29
-35
lines changed

SECURITY.md

Lines changed: 29 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -1,63 +1,57 @@
1-
# Security Vulnerability Disclosure Policy
1+
## Security Vulnerability Disclosure Policy
22

3-
We take security seriously and value the contributions of the security community. If you believe you have found a vulnerability in our services or software, we encourage you to report it responsibly so we can address it promptly.
3+
We take security seriously and value the contributions of researchers who act in good faith to help protect our users. If you believe you have found a vulnerability in our services or software, we encourage you to report it responsibly so we can address it promptly.
44

55
### Reporting a Vulnerability
66

7-
Please email your findings to published [security contacts](https://altcha.org/contact#reporting-security-issues).
7+
Please email your findings to our [security contacts](https://altcha.org/contact#reporting-security-issues).
88
To ensure confidentiality, we recommend encrypting your report using our [PGP key](https://altcha.org/pgp/security-public-key.asc).
99

10-
Your report should include the following, where possible:
10+
Your report should include:
1111

1212
* A clear description of the vulnerability.
1313
* A working proof of concept or detailed steps to reproduce the issue.
14-
* Any relevant logs, screenshots, or code snippets that support your findings.
14+
* Relevant logs, screenshots, or code snippets.
1515

16-
We will acknowledge receipt of your report within 5 business days, and keep you informed about the progress of our investigation.
16+
We will acknowledge receipt of your report within 5 business days and keep you informed about our investigation.
1717

1818
### In-Scope
1919

20-
We welcome reports that:
20+
We prioritize reports that demonstrate a real, actionable security risk to our software, services, or infrastructure, such as:
2121

22-
* Demonstrate a real security risk (e.g., XSS, CSRF, SSRF, authentication bypass, privilege escalation, remote code execution, etc.).
23-
* Affect our software, services, or infrastructure directly under our control.
24-
* Include a valid proof of concept demonstrating how the vulnerability can be exploited.
22+
* Remote code execution (RCE)
23+
* Authentication bypass or privilege escalation
24+
* Server-side request forgery (SSRF)
25+
* Cross-site scripting (XSS) or CSRF with significant impact
2526

2627
### Out-of-Scope
2728

28-
The following issues are generally not eligible for rewards, but we still welcome these reports as they help us improve overall security hygiene:
29+
To minimize automated noise, the following are generally excluded from our review process:
2930

30-
* Reports from automated tools or scanners that lack actionable proof of exploitability.
31-
* Security recommendations or best practices such as missing HTTP security headers, TLS configurations, DNS records, or server banners.
32-
* Denial of service attacks that rely on large volumes of traffic.
33-
* Rate limiting, CAPTCHA strength, or content/spam flooding.
34-
* Clickjacking on pages without sensitive actions.
35-
* Bugs that require root/jailbroken devices or outdated browsers.
36-
* Issues in third-party services or libraries not managed by us.
31+
* Automated results: Reports generated by scanners that lack a manual, actionable proof of exploitability.
32+
* Configuration & Hygiene: Missing HTTP headers, TLS/SSL configurations, DNS records, or server banners.
33+
* Volume-based attacks: Denial of Service (DoS/DDoS) or rate-limiting issues.
34+
* Low-impact: Clickjacking on non-sensitive pages, or bugs requiring jailbroken devices/unsupported browsers.
35+
* Third-party: Issues in libraries or services not directly managed by us.
3736

38-
While these may not be considered critical security vulnerabilities, we still care and may address them internally where appropriate. Your feedback helps us maintain a stronger security posture.
37+
### Responsible Disclosure Guidelines
3938

40-
### Rewards
39+
To remain in good standing with our team, we ask that you:
4140

42-
We may offer a discretionary reward (bounty) for valid, impactful reports that:
41+
* Do not publicly disclose vulnerabilities before we have confirmed a fix.
42+
* Do not access, modify, or delete data that does not belong to you.
43+
* Avoid any actions that could degrade or disrupt our services.
4344

44-
* Are submitted responsibly and in good faith.
45-
* Are not the result of automated scanning.
46-
* Include a clear demonstration of how the issue can be exploited in practice.
45+
We appreciate the efforts of the security community in helping us maintain a safe environment.
4746

48-
We do not offer rewards for:
47+
### Disclaimer
4948

50-
* Reports generated solely through automated tools.
51-
* Vulnerabilities lacking a proof of concept.
52-
* Low-risk issues or theoretical attacks.
49+
This is a voluntary disclosure program rooted in the spirit of open-source collaboration. We operate this program to benefit the broader community and ensure the collective safety of our users. We do not offer any form of compensation for submitted reports. By submitting a report, you acknowledge that you are doing so without expectation of payment and waive any future claims for compensation.
5350

54-
Reward amounts are determined at our discretion based on severity, impact, and quality of the report.
51+
### Related
5552

56-
### Responsible Disclosure Guidelines
53+
* [Security Advisory](https://altcha.org/security-advisory)
5754

58-
* Please do not publicly disclose vulnerabilities before we have had a chance to fix them.
59-
* Do not access, modify, or delete data that does not belong to you.
60-
* Avoid actions that could degrade or disrupt our services during testing.
61-
* Only test systems that are clearly part of our infrastructure.
55+
---
6256

63-
We thank you for helping us keep our services safe and secure.
57+
Updated: Feb 4, 2026

0 commit comments

Comments
 (0)