Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
51 changes: 51 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
# Security Policy

## Vulnerability Disclosure Policy

At SoroTask, we take the security of our decentralized task marketplace seriously. If you believe you’ve found a security vulnerability in SoroTask, please let us know right away.

### Reporting a Vulnerability

**Do not report security vulnerabilities via public GitHub issues.**

Please report any identified vulnerabilities by emailing `[email protected]`.

Your report should include:

- A description of the vulnerability.
- Steps to reproduce (PoC).
- Potential impact.
- Any suggested fixes (if available).

### Scope

The following components are in scope for this policy:

#### Primary Scope (On-chain)

- **Smart Contracts**: All code in `/contract` deployed on Soroban.
- **Protocol Logic**: Any issues related to reward distribution, task execution integrity, or core protocol mechanics.

#### Secondary Scope (Infrastructure & Frontend)

- **Official Keeper Service**: The execution logic in `/keeper` (e.g., DoS, memory leaks, or execution failures).
- **Official Frontend Dashboard**: The user interface in `/frontend` (e.g., XSS, UI manipulation, or phish-prone components).

### Prohibited Actions

- Any testing that interferes with other users' tasks or funds.
- Denial of Service (DoS) attacks.
- Social engineering or physical security attacks.
- Publicly disclosing the vulnerability before we have had a chance to fix it.

### Our Commitment

We will acknowledge your report within **48 hours** and provide a timeline for resolution based on the severity of the issue.

- **Acknowledgment**: Within 2 working days.
- **Initial Evaluation**: Within 5 working days.
- **Resolution**: Dependent on severity (aiming for < 30 days).

---

_Safe Harbor: If you conduct your security research activities within this policy, we will not initiate legal action against you._