|
| 1 | +# Security Policy |
| 2 | + |
| 3 | +1. [Reporting security problems](#reporting) |
| 4 | +1. [Security Bug Bounties](#bounty) |
| 5 | +1. [Scope](#scope) |
| 6 | +1. [Incident Response Process](#process) |
| 7 | + |
| 8 | +<a name="reporting"></a> |
| 9 | +## Reporting security problems to Solana |
| 10 | + |
| 11 | +**DO NOT CREATE AN ISSUE** to report a security problem. Instead, please send an |
| 12 | +email to [email protected] and provide your github username so we can add you |
| 13 | +to a new draft security advisory for further discussion. |
| 14 | + |
| 15 | +Expect a response as fast as possible, typically within 72 hours. |
| 16 | + |
| 17 | +<a name="bounty"></a> |
| 18 | +## Security Bug Bounties |
| 19 | +We offer bounties for critical security issues. Please see the |
| 20 | +[Solana Security Bug Bounties](https://github.com/solana-labs/solana/security/policy#security-bug-bounties) |
| 21 | +for details on classes of bugs and payment amounts. |
| 22 | + |
| 23 | +<a name="scope"></a> |
| 24 | +## Scope |
| 25 | + |
| 26 | +Only a subset of programs within the Solana Program Library repo are deployed to |
| 27 | +mainnet-beta and maintained by the team. Currently, this includes: |
| 28 | + |
| 29 | +* [associated-token-account](https://github.com/solana-labs/solana-program-library/tree/master/associated-token-account/program) |
| 30 | +* [feature-proposal](https://github.com/solana-labs/solana-program-library/tree/master/feature-proposal/program) |
| 31 | +* [governance](https://github.com/solana-labs/solana-program-library/tree/master/governance/program) |
| 32 | +* [memo](https://github.com/solana-labs/solana-program-library/tree/master/memo/program) |
| 33 | +* [name-service](https://github.com/solana-labs/solana-program-library/tree/master/name-service/program) |
| 34 | +* [stake-pool](https://github.com/solana-labs/solana-program-library/tree/master/stake-pool/program) |
| 35 | +* [token](https://github.com/solana-labs/solana-program-library/tree/master/token/program) |
| 36 | + |
| 37 | +If you discover a critical security issue in an out-of-scope program, your finding |
| 38 | +may still be valuable. |
| 39 | + |
| 40 | +Many programs, including |
| 41 | +[token-swap](https://github.com/solana-labs/solana-program-library/tree/master/token-swap/program) |
| 42 | +and [token-lending](https://github.com/solana-labs/solana-program-library/tree/master/token-lending/program), |
| 43 | +have been forked and deployed by prominent ecosystem projects, many of which |
| 44 | +have their own bug bounty programs. |
| 45 | + |
| 46 | +While we cannot guarantee a bounty from another entity, we can help determine who |
| 47 | +may be affected and put you in touch the corresponding teams. |
| 48 | + |
| 49 | +<a name="process"></a> |
| 50 | +## Incident Response Process |
| 51 | + |
| 52 | +In case an incident is discovered or reported, the |
| 53 | +[Solana Security Incident Response Process](https://github.com/solana-labs/solana/security/policy#incident-response-process) |
| 54 | +will be followed to contain, respond and remediate. |
0 commit comments