mirror of
https://github.com/ethereum/solidity
synced 2023-10-03 13:03:40 +00:00
Add a security policy and link it in README.
Co-Authored-By: chriseth <chris@ethereum.org>
This commit is contained in:
parent
ff23f165f0
commit
37fb53bebd
@ -12,6 +12,7 @@ Solidity is a statically typed, contract-oriented, high-level language for imple
|
||||
- [Development](#development)
|
||||
- [Maintainers](#maintainers)
|
||||
- [License](#license)
|
||||
- [Security](#security)
|
||||
|
||||
## Background
|
||||
|
||||
@ -75,3 +76,7 @@ releases [in the projects section](https://github.com/ethereum/solidity/projects
|
||||
Solidity is licensed under [GNU General Public License v3.0](LICENSE.txt).
|
||||
|
||||
Some third-party code has its [own licensing terms](cmake/templates/license.h.in).
|
||||
|
||||
## Security
|
||||
|
||||
The security policy may be [found here](SECURITY.md).
|
||||
|
52
SECURITY.md
Normal file
52
SECURITY.md
Normal file
@ -0,0 +1,52 @@
|
||||
# Security Policy
|
||||
|
||||
The Solidity team and community take all security bugs in Solidity seriously.
|
||||
We appreciate your efforts and responsible disclosure and will make every effort to acknowledge your contributions.
|
||||
|
||||
## Scope
|
||||
|
||||
Bugs in the Solidity repository are in scope.
|
||||
Bugs in third-party dependencies e.g., jsoncpp, boost etc. are not in scope unless they result in a Solidity specific bug.
|
||||
|
||||
Only bugs that have a demonstrable security impact on smart contracts are in scope.
|
||||
For example, a Solidity program whose optimization is incorrect (e.g., leads to an incorrect output) qualifies as a security bug.
|
||||
Please note that the [rules][2] of the [Ethereum bounty program][1] have precedence over this security policy.
|
||||
|
||||
## Supported Versions
|
||||
|
||||
As a general rule, only the latest release gets security updates.
|
||||
Exceptions may be made when the current breaking release is relatively new, e.g. less than three months old.
|
||||
If you are reporting a bug, please state clearly the Solidity version(s) it affects.
|
||||
|
||||
Example 1: Assuming the current release is `0.6.3` and a security bug has been found in it that affects both `0.5.x` and `0.6.x` trees, we may not only patch `0.6.3` (the bug-fix release numbered `0.6.4`) but `0.5.x` as well (the bug-fix release numbered `0.5.(x+1)`).
|
||||
|
||||
Example 2: Assuming the current release is `0.6.25` and a security bug has been found in it, we may only patch `0.6.25` (in the bug-fix release numbered `0.6.26`) even if the bug affects a previous tree such as `0.5.x`.
|
||||
|
||||
## Reporting a Vulnerability
|
||||
|
||||
To report a vulnerability, please follow the instructions stated in the [Ethereum bounty program][1].
|
||||
|
||||
In the bug report, please include all details necessary to reproduce the vulnerability such as:
|
||||
|
||||
- Input program that triggers the bug
|
||||
- Compiler version affected
|
||||
- Target EVM version
|
||||
- Framework/IDE if applicable
|
||||
- EVM execution environment/client if applicable
|
||||
- Operating system
|
||||
|
||||
Please include steps to reproduce the bug you have found in as much detail as possible.
|
||||
|
||||
Once we have received your bug report, we will try to reproduce it and provide a more detailed response.
|
||||
Once the reported bug has been successfully reproduced, the Solidity team will work on a fix.
|
||||
|
||||
The Solidity team maintains the following JSON-formatted lists of patched security vulnerabilities:
|
||||
|
||||
- [Summary of known security vulnerabilities][3]
|
||||
- [List of security vulnerabilities affecting a specific version of the compiler][4].
|
||||
|
||||
|
||||
[1]: https://bounty.ethereum.org/
|
||||
[2]: https://bounty.ethereum.org/#rules
|
||||
[3]: https://solidity.readthedocs.io/en/develop/bugs.html
|
||||
[4]: https://github.com/ethereum/solidity/blob/develop/docs/bugs_by_version.json
|
Loading…
Reference in New Issue
Block a user