Responsible Disclosure Process

Twinstake Limited

Scope

This document should serve as a guideline for any external submissions regarding reporting security, confidentiality, integrity, and availability failures, incidents, concerns, and other complaints.

Vulnerability Report/Disclosure

How to Submit a Vulnerability

To submit a vulnerability report to Twinstake’s Security Team, please email [email protected]. If you need to send the content via GPG (encrypted email), or in another form, please email this address in plain text first, indicating your requirement(s).

Preference, Prioritization, and Acceptance Criteria

We will use the criteria from the next sections to prioritize and triage submissions.

What we would like to see from you:

  • Well-written reports in English will have a higher probability of resolution.
  • Reports that include proof-of-concept code equip us to better triage.
  • Reports that include only crash dumps or other automated tool output may receive lower priority.
  • Reports that include products not on the initial scope list may receive lower priority.
  • Please include how you found the bug, the impact, and any potential remediation.
  • Please include any plans or intentions for public disclosure.
What you can expect from Twinstake:
  1. A timely response to your email (within 3 business days).
  2. After triage, we will send an expected timeline, and commit to being as transparent as possible about the remediation timeline as well as on issues or challenges that may extend it.
  3. An open dialog to discuss issues.
  4. Notification when the vulnerability analysis has completed each stage of our review.
  5. Credit after the vulnerability has been validated and fixed.

If we are unable to resolve communication issues or other problems, Twinstake may bring in a trusted, neutral third party to assist in determining how best to handle the vulnerability.