|
1 | 1 | # Talus Labs Security Policy |
2 | 2 |
|
3 | | -This document describes the Talus Labs Security team's process for handling security issues. |
| 3 | +This document describes the Talus Labs security team's process for handling security issues across all Talus repositories and services. |
4 | 4 |
|
5 | 5 | ## Reporting Security Issues |
6 | 6 |
|
7 | | -__IMPORTANT:__ _Please DO NOT open public issues for security related matters, or discuss it in public forum or on social media._ |
| 7 | +**IMPORTANT:** Please DO NOT open public issues for security-related matters or discuss them in public forums or on social media. |
8 | 8 |
|
9 | | -### Email |
| 9 | +### Primary Reporting Methods |
10 | 10 |
|
11 | | -All security issues should be reported via email to [security-reports@taluslabs.xyz](mailto:security-reports@taluslabs.xyz). Email is delivered to the Talus Labs security team. |
| 11 | +#### Email (Recommended) |
| 12 | +Report security issues to: **[security-reports@taluslabs.xyz](mailto:security-reports@taluslabs.xyz)** |
12 | 13 |
|
13 | | -Include the following details in the report: |
| 14 | +Include these details in your report: |
| 15 | +- **Your information**: Name and affiliation (if applicable) |
| 16 | +- **Technical description**: Detailed issue explanation with reproduction steps |
| 17 | +- **Impact assessment**: Who can exploit this and what the implications may be |
| 18 | +- **Visibility status**: Whether this vulnerability is public or known to third parties |
| 19 | +- **Supporting evidence**: Relevant logs, screenshots, or proof-of-concept (if safe to share) |
14 | 20 |
|
15 | | -- Your name; |
16 | | -- Your affiliation (if applicable); |
17 | | -- Technical description of the issue, including steps to reproduce; |
18 | | -- Explanation of who may be able to exploit this vulnerability and what the impact or implications may be; |
19 | | -- Whether this vulnerability is public or known to third parties. Please provide details where applicable; |
| 21 | +#### GitHub Private Vulnerability Reporting |
| 22 | +For repository-specific issues, use GitHub's private vulnerability reporting: |
| 23 | +1. Navigate to the repository's "Security" tab |
| 24 | +2. Click "Report a vulnerability" under Security Advisories |
| 25 | +3. Complete the form with detailed information |
20 | 26 |
|
21 | | -_Please notify the Talus Labs security team at the email above of existing public issues that may be of critical security importance._ Please ensure to include the issue ID along with a short description / explanation of the security relevance. |
| 27 | +See [GitHub's documentation](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability) for more information. |
22 | 28 |
|
23 | | -### GitHub Private Vulnerability Reporting |
| 29 | +### Encrypted Communication |
24 | 30 |
|
25 | | -Under the repository "Security" tab / Security Advisories you will find "Report a vulnerability". Please complete the provided form with as much details as possible. |
| 31 | +For sensitive reports, use our PGP public key: |
| 32 | +- **Download**: [https://talus.network/security-pgp-key.txt](https://talus.network/security-pgp-key.txt) |
| 33 | +- **Key Server**: [keys.openpgp.org](https://keys.openpgp.org) |
| 34 | +- **Fingerprint**: `103391C9AE4BE87A85E3EFAE2D4462A29BAB94AE` |
26 | 35 |
|
27 | | -For more information on GitHub private vulnerability reporting [see this](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability). |
| 36 | +**Always verify the fingerprint before using the key.** |
28 | 37 |
|
29 | | -_Best practices for writing repository security advisories_ can be found [here](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/best-practices-for-writing-repository-security-advisories). |
| 38 | +## Our Response Process |
30 | 39 |
|
31 | | -Security researchers can also use the REST API to privately report security vulnerabilities. For more information, see "[Privately report a security vulnerability](https://docs.github.com/en/rest/security-advisories/repository-advisories#privately-report-a-security-vulnerability)" in the REST API documentation. |
| 40 | +The Talus Labs security team will: |
32 | 41 |
|
33 | | -### Encrypted Communication |
| 42 | +1. **Acknowledge receipt** within 72 hours |
| 43 | +2. **Verify and assess** the reported vulnerability |
| 44 | +3. **Determine scope** including affected versions and impact assessment |
| 45 | +4. **Audit for similar issues** to prevent related vulnerabilities |
| 46 | +5. **Develop fixes** for all affected production releases |
| 47 | +6. **Coordinate disclosure** with ecosystem stakeholders when appropriate |
| 48 | +7. **Deploy fixes** following our emergency release procedures |
| 49 | +8. **Publish advisories** once fixes are deployed and users can update |
34 | 50 |
|
35 | | -If you wish to encrypt your vulnerability report, please use our PGP public key: |
| 51 | +### Timeline Expectations |
| 52 | +- **Initial response**: Within 72 hours |
| 53 | +- **Severity assessment**: Within 5 business days |
| 54 | +- **Fix development**: Varies by complexity, communicated during assessment |
| 55 | +- **Public disclosure**: After fixes are available and reasonable time for adoption |
36 | 56 |
|
37 | | -- **Download**: [https://talus.network/security-pgp-key.txt](https://talus.network/security-pgp-key.txt) |
38 | | -- **Key Server**: [keys.openpgp.org](https://keys.openpgp.org) |
39 | | -- **Fingerprint**: `103391C9AE4BE87A85E3EFAE2D4462A29BAB94AE` |
| 57 | +## Incident Response Integration |
40 | 58 |
|
41 | | -Always verify the fingerprint before using the key. |
| 59 | +Security issues may trigger our [Incident Management Plan](https://www.notion.so/taluslabs/Incident-Management-Plan-25e7a61d1baa80498736f5ece8e58ece), particularly for: |
| 60 | +- Active exploits affecting user funds or data |
| 61 | +- Platform-wide vulnerabilities |
| 62 | +- Critical infrastructure compromises |
42 | 63 |
|
43 | | -## Handling Security Issues |
| 64 | +In such cases, response times may be accelerated and additional coordination procedures activated. |
44 | 65 |
|
45 | | -The Talus Labs security team will: |
| 66 | +## Researcher Guidelines |
| 67 | + |
| 68 | +Please help us handle security issues effectively by: |
| 69 | + |
| 70 | +### Responsible Disclosure |
| 71 | +- **Allow reasonable time** for our team to respond and address issues |
| 72 | +- **Coordinate disclosure timing** to ensure users can protect themselves |
| 73 | +- **Provide clear communication** throughout the process |
| 74 | + |
| 75 | +### Research Ethics |
| 76 | +- **Avoid exploitation** of discovered vulnerabilities |
| 77 | +- **Demonstrate good faith** by not disrupting services, data, or communities |
| 78 | +- **Respect privacy** and avoid accessing user data |
| 79 | +- **Follow applicable laws** in your research activities |
| 80 | + |
| 81 | +## Safe Harbor Policy |
| 82 | + |
| 83 | +Talus Labs is committed to working constructively with security researchers and the broader security community. |
| 84 | + |
| 85 | +### Legal Protection |
| 86 | +When conducting vulnerability research according to this policy, we consider such research to be: |
| 87 | + |
| 88 | +- **Authorized** under applicable computer fraud and abuse laws |
| 89 | +- **Exempt** from Terms of Service restrictions that would interfere with security research |
| 90 | +- **Lawful and beneficial** when conducted in good faith and compliance with applicable laws |
| 91 | + |
| 92 | +### Research Scope |
| 93 | +This safe harbor applies to security research on: |
| 94 | +- **Talus Labs infrastructure** and operated services |
| 95 | +- **Nexus platform** and related open source software |
| 96 | +- **Public-facing applications** and websites operated by Talus Labs |
| 97 | +- **Smart contracts** deployed by Talus Labs |
46 | 98 |
|
47 | | -1. Acknowledge receipt within 72 hours; |
48 | | -2. Verify and confirm the issue; |
49 | | -3. Determine affected versions and scope of impact; |
50 | | -4. Conduct audits to find any potential similar and related issues; |
51 | | -5. Prepare fixes for relevant in-production releases; |
52 | | -6. Endeavor to communicate and coordinate with relevant ecosystem stakeholders, including the Nexus communities, at the appropriate times; |
| 99 | +### Good Faith Requirements |
| 100 | +To qualify for safe harbor protection, research must: |
| 101 | +- **Avoid privacy violations** and data access/modification |
| 102 | +- **Prevent service disruption** or data destruction |
| 103 | +- **Exclude social engineering** against employees or community members |
| 104 | +- **Provide reasonable disclosure time** before any public disclosure |
| 105 | +- **Comply with applicable laws** and agreements |
53 | 106 |
|
54 | | -Please assist the Talus Labs security team by following these guidelines: |
| 107 | +## Scope and Exclusions |
55 | 108 |
|
56 | | -- Allow a reasonable amount of time for the team to respond to and address the issue; |
57 | | -- Avoid exploiting any issues or vulnerabilities that you may become aware of; |
58 | | -- Demonstrate good faith by not disrupting the Talus Labs / Nexus networks, data, services or communities; |
| 109 | +### In Scope |
| 110 | +- **Platform vulnerabilities**: Nexus protocol and infrastructure |
| 111 | +- **Smart contract issues**: Logic flaws, economic exploits, access control |
| 112 | +- **Infrastructure security**: API endpoints, authentication, data handling |
| 113 | +- **Dependency vulnerabilities**: Third-party library issues affecting our services |
| 114 | +- **Configuration issues**: Misconfigurations leading to security exposure |
59 | 115 |
|
60 | | -_Every effort will be made to handle and address security issues as quickly and efficiently as possible._ |
| 116 | +### Out of Scope |
| 117 | +- **Social engineering** attacks on staff or users |
| 118 | +- **Physical security** of office locations |
| 119 | +- **Distributed denial of service (DDoS)** attacks |
| 120 | +- **Spam or content-based** attacks |
| 121 | +- **Issues in third-party** services not controlled by Talus Labs |
61 | 122 |
|
62 | | -## Safe Harbor |
| 123 | +## Recognition and Rewards |
63 | 124 |
|
64 | | -Talus Labs is committed to working with security researchers and the broader security community. We believe that responsible security research benefits everyone and helps keep our users safe. |
| 125 | +From time to time we may operate formal bug bounty programs. We may publish these on our web site, social media or other formal communication channels. |
65 | 126 |
|
66 | | -**Legal Safe Harbor**: When conducting vulnerability research in accordance with this policy, we consider such research to be: |
| 127 | +We recognize valuable security research through: |
| 128 | +- **Public acknowledgment** in security advisories (with your permission) |
| 129 | +- **Direct communication** with our security team |
| 130 | +- **Community recognition** when appropriate |
| 131 | +- **Swag and merchandise** for significant contributions |
67 | 132 |
|
68 | | -- **Authorized** in accordance with applicable computer fraud and abuse laws, and we will not initiate or recommend legal action against you for accidental, good-faith violations of this policy; |
69 | | -- **Exempt** from restrictions in our Terms of Service/Use that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; |
70 | | -- **Lawful** and helpful to the overall security of the Internet when conducted in good faith and in compliance with applicable laws. |
| 133 | +## Questions and Support |
71 | 134 |
|
72 | | -**Research Guidelines**: To qualify for safe harbor protection, security research must be conducted in good faith, which means: |
| 135 | +For questions about this security policy or the reporting process: |
| 136 | +- **Email**: [security-reports@taluslabs.xyz](mailto:security-reports@taluslabs.xyz) |
| 137 | +- **General security discussions**: Use GitHub Discussions in relevant repositories |
73 | 138 |
|
74 | | -- You make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of Talus Labs services and the Nexus network; |
75 | | -- You do not access, modify, or delete data belonging to others; |
76 | | -- You do not perform attacks that could harm the reliability/integrity of our services or data; |
77 | | -- You do not use social engineering techniques against our employees, contractors, or community members; |
78 | | -- You provide us with reasonable time to address the issue before any disclosure; |
79 | | -- You do not violate any law or breach any agreement in the course of your research. |
| 139 | +--- |
80 | 140 |
|
81 | | -**Scope**: This safe harbor applies to security research conducted on: |
82 | | -- Talus Labs operated infrastructure and services |
83 | | -- Open source Nexus software and related repositories |
84 | | -- Public-facing websites and applications operated by Talus Labs |
| 141 | +**Last updated**: 2025-09-22 |
| 142 | +**Version**: 2.0 |
85 | 143 |
|
86 | | -If you have questions about whether your research is consistent with this policy, please contact us at [security-reports@taluslabs.xyz](mailto:security-reports@taluslabs.xyz) before proceeding. |
| 144 | +*This policy is regularly reviewed and updated to reflect our evolving security practices and community needs.* |
0 commit comments