Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
74 changes: 74 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,74 @@
# Security Policy

## Reporting Security Vulnerabilities

We take security vulnerabilities seriously and appreciate your efforts to responsibly disclose any issues you may find.

### How to Report a Security Vulnerability

If you discover a security vulnerability in Payy, please report it to us through one of the following channels:

**Primary Contact:**
- Email: security@payy.network

**Alternative Contacts:**
- Create a private security advisory on GitHub: [Report a vulnerability](https://github.com/polybase/zk-rollup/security/advisories/new)
- Contact the maintainers directly:
- @calummoore
- @soru23

### What to Include in Your Report

To help us understand and address the issue quickly, please include:

1. A clear description of the vulnerability
2. Steps to reproduce the issue
3. Potential impact assessment
4. Any suggested fixes or mitigations
5. Your contact information for follow-up questions

### Response Timeline

- **Acknowledgment**: We will acknowledge receipt of your report within 48 hours
- **Initial Assessment**: We will provide an initial assessment within 5 business days
- **Resolution**: We aim to resolve critical vulnerabilities within 30 days

### Responsible Disclosure Guidelines

We ask that you:

- Give us reasonable time to investigate and fix the issue before public disclosure
- Avoid accessing, modifying, or deleting user data
- Do not perform actions that could harm the service or its users
- Do not publicly disclose the vulnerability until we have had a chance to address it

### Bug Bounty Program

We are currently evaluating the establishment of a formal bug bounty program. In the meantime, we will consider rewards for significant security findings on a case-by-case basis.

### Scope

This security policy applies to:

- The Payy zk-rollup protocol
- Smart contracts deployed on Ethereum
- Core node implementation
- Prover and aggregator services
- Frontend applications
- API endpoints and RPC services

### Out of Scope

- Third-party dependencies (please report directly to the respective projects)
- Social engineering attacks
- Physical security issues
- Denial of service attacks

### Recognition

We believe in recognizing security researchers who help make Payy safer. With your permission, we will:

- Acknowledge your contribution in our security advisories
- Add you to our security researchers hall of fame (if you wish)

Thank you for helping keep Payy and our users safe!