Skip to content

Commit

Permalink
WIP: Begin security section clean up (#264)
Browse files Browse the repository at this point in the history
* Begin security section clean up

* complete the report missing sections

* Add hyperlinks, remove duplication

* Links cleanup and page reordering

---------

Co-authored-by: Aly <16789036+aly-obol@users.noreply.github.com>
Co-authored-by: thomasheremans <th.heremans@gmail.com>
  • Loading branch information
3 people authored Oct 3, 2023
1 parent 765e550 commit 2e62e0f
Show file tree
Hide file tree
Showing 7 changed files with 341 additions and 63 deletions.
51 changes: 36 additions & 15 deletions docs/sec/bug-bounty.md
Original file line number Diff line number Diff line change
@@ -1,29 +1,35 @@
---
sidebar_position: 2
description: Bug Bounty Policy
sidebar_position: 3
---

# Obol Bug Bounty

## Overview
Obol Labs is committed to ensuring the security of our distributed validator software and services. As part of our commitment to security, we have established a bug bounty program to encourage security researchers to report vulnerabilities in our software and services to us so that we can quickly address them.

Obol Labs is committed to ensuring the security of our distributed validator software and services. As part of our commitment to security, we have established a bug bounty program to encourage security researchers to report vulnerabilities in our software and services to us so that we can quickly address them.

## Eligibility

To participate in the Bug Bounty Program you must:

- Not be a resident of any country that does not allow participation in these types of programs
- Be at least 14 years old and have legal capacity to agree to these terms and participate in the Bug Bounty Program
- Have permission from your employer to participate
- Not be (for the previous 12 months) an Obol Labs employee, immediate family member of an Obol employee, Obol contractor, or Obol service provider.

## Scope

The bug bounty program applies to software and services that are built by Obol. Only submissions under the following domains are eligible for rewards:

- Charon DVT Middleware
- DV Launchpad
- Obol’s Public API
- Obol’s Smart Contracts and the contracts they depend on.
- Obol’s Public Relay

Additionally, all vulnerabilities that require or are related to the following are out of scope:

- Social engineering
- Rate Limiting (Non-critical issues)
- Physical security
Expand All @@ -32,6 +38,7 @@ Additionally, all vulnerabilities that require or are related to the following a
- The Obol website or the Obol infrastructure in general is NOT part of this bug bounty program.

## Rules

- Bug has not been publicly disclosed
- Vulnerabilities that have been previously submitted by another contributor or already known by the Obol development team are not eligible for rewards
- The size of the bounty payout depends on the assessment of the severity of the exploit. Please refer to the rewards section below for additional details
Expand All @@ -41,55 +48,69 @@ Additionally, all vulnerabilities that require or are related to the following a
- Details of any valid bugs may be shared with complementary protocols utilised in the Obol ecosystem in order to promote ecosystem cohesion and safety.

## Rewards

The rewards for participating in our bug bounty program will be based on the severity and impact of the vulnerability discovered. We will evaluate each submission on a case-by-case basis, and the rewards will be at Obol’s sole discretion.

### Low: up to $500

A Low-level vulnerability is one that has a limited impact and can be easily fixed. Unlikely to have a meaningful impact on availability, integrity, and/or loss of funds.

- Low impact, medium likelihood
- Medium impact, low likelihood
Examples:
Examples:
- Attacker can sometimes put a charon node in a state that causes it to drop one out of every one hundred attestations made by a validator

### Medium: up to $1,000
A Medium-level vulnerability is one that has a moderate impact and requires a more significant effort to fix. Possible to have an impact on availability, integrity, and/or loss of funds.

A Medium-level vulnerability is one that has a moderate impact and requires a more significant effort to fix. Possible to have an impact on validator availability, integrity, and/or loss of funds.

- High impact, low likelihood
- Medium impact, medium likelihood
- Low impact, high likelihood
Examples:
Examples:
- Attacker can successfully conduct eclipse attacks on the cluster nodes with peer-ids with 4 leading zero bytes.

### High: up to $2,500
### High: up to $4,000

A High-level vulnerability is one that has a significant impact on the security of the system and requires a significant effort to fix. Likely to have impact on availability, integrity, and/or loss of funds.

- High impact, medium likelihood
- Medium impact, high likelihood
Examples:
- Attacker can successfully partition the cluster and exceeding its threshold.
Examples:
- Attacker can successfully partition the cluster and keep the cluster offline.

### Critical: up to $10,000

A Critical-level vulnerability is one that has a severe impact on the security of the in-production system and requires immediate attention to fix. Highly likely to have a material impact on availability, integrity, and/or loss of funds.

### Critical: up to $5,000
A Critical-level vulnerability is one that has a severe impact on the security of the system and requires immediate attention to fix. Highly likely to have a material impact on availability, integrity, and/or loss of funds.
- High impact, high likelihood
Examples:
- Attacker can successfully conduct remote code execution in charon client.
Examples:
- Attacker can successfully conduct remote code execution in charon client to exfiltrate BLS private key material.

We may offer rewards in the form of cash, merchandise, or recognition. We will only award one reward per vulnerability discovered, and we reserve the right to deny a reward if we determine that the researcher has violated the terms and conditions of this policy.

## Submission process
## Submission process

Please email security@obol.tech

Your report should include the following information:

- Description of the vulnerability and its potential impact
- Steps to reproduce the vulnerability
- Proof of concept code, screenshots, or other supporting documentation
- Your name, email address, and any contact information you would like to provide.
Reports that do not include sufficient detail will not be eligible for rewards.
Reports that do not include sufficient detail will not be eligible for rewards.

## Disclosure Policy

Obol Labs will disclose the details of the vulnerability and the researcher’s identity (with their consent) only after we have remediated the vulnerability and issued a fix. Researchers must keep the details of the vulnerability confidential until Obol Labs has acknowledged and remediated the issue.

## Legal Compliance

All participants in the bug bounty program must comply with all applicable laws, regulations, and policy terms and conditions. Obol will not be held liable for any unlawful or unauthorised activities performed by participants in the bug bounty program.

We will not take any legal action against security researchers who discover and report security vulnerabilities in accordance with this bug bounty policy. We do, however, reserve the right to take legal action against anyone who violates the terms and conditions of this policy.

## Non-Disclosure Agreement
All participants in the bug bounty program will be required to sign a non-disclosure agreement (NDA) before they are given access to our software and services for testing purposes.

All participants in the bug bounty program will be required to sign a non-disclosure agreement (NDA) before they are given access to closed source software and services for testing purposes.
5 changes: 3 additions & 2 deletions docs/sec/contact.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
---
description: Security Contacts
sidebar_position: 4
sidebar_position: 3
description: Security details for the Obol Network
---

# Contacts

Please email security@obol.tech to report a security incident, vulnerability, bug or inquire about Obol's security.

Also, visit the [obol security repo](https://github.com/ObolNetwork/obol-security) for more details.
Loading

0 comments on commit 2e62e0f

Please sign in to comment.