- Remove executable permissions from configuration files (.editorconfig, .env.example, .gitignore) - Remove executable permissions from documentation files (README.md, LICENSE, SECURITY.md) - Remove executable permissions from web assets (HTML, CSS, JS files) - Remove executable permissions from data files (JSON, SQL, YAML, requirements.txt) - Remove executable permissions from source code files across all apps - Add executable permissions to Python
7.8 KiB
Security Policy
Supported Versions
Use this section to tell people about which versions of your project are currently being supported with security updates.
| Version | Supported | Release Date | Security Support |
|---|---|---|---|
| 2.0.x | ✅ | 2026-03-04 | Current production version |
| 1.5.x | ✅ | 2026-02-15 | Legacy support (limited) |
| 1.0.x | ❌ | 2025-12-01 | End of life |
| < 1.0 | ❌ | Historical | No support |
Security Policy Overview
The AITBC (AI Trading Blockchain Compute) platform takes security seriously. This document outlines our security practices and how to responsibly report vulnerabilities.
Security Scope
The following components are within scope for security vulnerability reports:
- Core Services: Coordinator API, Exchange API, Blockchain Node, RPC services
- Smart Contracts: All on-chain contracts and token implementations
- Infrastructure: Authentication, authorization, and data protection mechanisms
- Dependencies: Third-party libraries and packages used in production
- Configuration: Environment variables, secrets management, and deployment scripts
Out of Scope
The following are typically out of scope unless they directly impact the security of our production systems:
- Development Tools: Scripts, utilities, and development-only code
- Documentation: Informational content and documentation files
- Test Networks: Test deployments and staging environments
- Third-party Services: External services not directly controlled by AITBC
Reporting a Vulnerability
How to Report
Primary Method: Send an email to our security team
- Email: security@aitbc.dev
- PGP Key: Available upon request for encrypted communications
Alternative Method: Use GitHub's private vulnerability reporting
- Visit: https://github.com/oib/AITBC/security/advisories/new
- Select "Report a vulnerability privately"
What to Include
Please include the following information in your report:
- Vulnerability Type: Brief description of the vulnerability class
- Affected Components: Which parts of the system are affected
- Impact Assessment: Potential impact if exploited
- Reproduction Steps: Detailed steps to reproduce the issue
- Proof of Concept: Code, screenshots, or other evidence
- Environment Details: Version, configuration, and environment information
Response Timeline
- Initial Response: Within 24 hours (acknowledgment)
- Initial Assessment: Within 3 business days
- Detailed Analysis: Within 7 business days
- Remediation Timeline: Based on severity (see below)
- Public Disclosure: After fix is deployed and coordinated disclosure
Severity Classification
| Severity | Description | Response Time | Disclosure Timeline |
|---|---|---|---|
| Critical | Remote code execution, data breach, financial loss | 24 hours | 7 days after fix |
| High | Privilege escalation, significant data exposure | 72 hours | 14 days after fix |
| Medium | Limited data exposure, service disruption | 7 days | 30 days after fix |
| Low | Information disclosure, minor issues | 14 days | 90 days after fix |
Security Practices
Development Security
- Code Review: All code changes undergo security review
- Static Analysis: Automated security scanning tools
- Dependency Scanning: Regular vulnerability scanning of dependencies
- Penetration Testing: Regular security assessments
- Security Training: Team members receive regular security training
Infrastructure Security
- Encryption: All data in transit and at rest is encrypted
- Access Control: Principle of least privilege enforced
- Audit Logging: Comprehensive logging and monitoring
- Network Security: Firewalls, intrusion detection, and prevention
- Regular Updates: Security patches applied promptly
Smart Contract Security
- Audits: All smart contracts undergo professional security audits
- Formal Verification: Critical contracts verified mathematically
- Bug Bounties: Responsible disclosure program for vulnerabilities
- Testing: Comprehensive test suite including security tests
- Upgradability: Secure upgrade mechanisms implemented
Coordinated Disclosure
Disclosure Process
- Report Received: Security team acknowledges receipt
- Validation: Vulnerability is validated and assessed
- Remediation: Fix is developed and tested
- Deployment: Fix is deployed to production
- Disclosure: Public disclosure with credit to reporter
Credit and Recognition
- Public Credit: Reporter acknowledged in security advisories
- Bug Bounty: Financial rewards for qualifying vulnerabilities
- Hall of Fame: Recognition in our security acknowledgments
- Swag: AITBC merchandise for significant contributions
Communication
- Status Updates: Regular updates on remediation progress
- Technical Details: Clear explanation of vulnerability and fix
- Mitigation Advice: Guidance for users to protect themselves
- Coordination: Coordination with other affected parties if needed
Security Best Practices for Users
For Node Operators
- Regular Updates: Keep software updated to latest versions
- Secure Configuration: Follow security configuration guidelines
- Access Control: Limit access to authorized personnel only
- Monitoring: Monitor for suspicious activity
- Backups: Regular, encrypted backups of critical data
For Developers
- Secure Coding: Follow secure coding practices
- Input Validation: Validate all user inputs
- Error Handling: Proper error handling without information leakage
- Authentication: Use strong authentication mechanisms
- Dependencies: Keep dependencies updated and vetted
For Users
- Strong Passwords: Use unique, strong passwords
- Two-Factor Authentication: Enable 2FA where available
- Phishing Awareness: Be cautious of suspicious communications
- Software Updates: Keep client software updated
- Private Keys: Never share private keys or sensitive data
Security Contacts
Security Team
- Email: security@aitbc.dev
- PGP: Available upon request
- Response Time: 24 hours for critical issues
General Inquiries
- Email: info@aitbc.dev
- Website: https://aitbc.dev
- Documentation: https://docs.aitbc.dev
Bug Bounty Program
- Platform: Private program (contact security team)
- Rewards: Based on severity and impact
- Guidelines: Available upon request
Legal Information
Safe Harbor
This security policy is intended to give security researchers clear guidelines for conducting vulnerability research and reporting. We commit to not take legal action against researchers who:
- Follow this vulnerability disclosure policy
- Only perform testing on systems they have authorized access to
- Do not exfiltrate, modify, or destroy data
- Do not disrupt service for other users
- Report findings promptly and responsibly
Disclaimer
This security policy may be updated from time to time. The latest version will always be available at https://github.com/oib/AITBC/blob/main/SECURITY.md
License
This security policy is provided under the same license as the AITBC project.
Security Advisories
Past security advisories and vulnerability disclosures are available at:
Acknowledgments
We thank all security researchers who contribute to the security of the AITBC platform through responsible vulnerability disclosure.
Last Updated: 2026-03-04
Version: 1.0
Contact: security@aitbc.dev
Project: AITBC (AI Trading Blockchain Compute)