Skip to content

Add SECURITY.md responsible disclosure policy#1017

Draft
nachog00 wants to merge 6 commits intodevfrom
security-policy
Draft

Add SECURITY.md responsible disclosure policy#1017
nachog00 wants to merge 6 commits intodevfrom
security-policy

Conversation

@nachog00
Copy link
Copy Markdown
Contributor

Summary

  • Adds SECURITY.md following the RD-Crypto-Spec Responsible Disclosure standard used by Zebra and Zcash
  • Documents two reporting paths: GitHub Private Vulnerability Reporting and encrypted email (security@zingolabs.org)
  • Includes a "Silent Exploitation Protection" deviation clause tailored to Zaino's indexer role (misreported balances, corrupted tree data, privacy leaks)
  • Marks bilateral disclosure agreements with ECC/ZF as intended but not yet formalized

TODOs before merging

  • Confirm zingolabs.org domain ownership and set up security@zingolabs.org mailbox/alias
  • Generate PGP key for security@zingolabs.org and embed the public key block in the file
  • Enable GitHub Private Vulnerability Reporting in repo settings (Settings > Code security and analysis)
  • Reach out to ECC and ZF about formalizing bilateral disclosure agreements

Follows the RD-Crypto-Spec standard used by the rest of the Zcash
ecosystem (Zebra, Zcash). Documents both GitHub Private Vulnerability
Reporting and encrypted email as intake paths, includes a "Silent
Exploitation Protection" deviation clause tailored to Zaino's indexer
role, and marks bilateral agreements with ECC/ZF as intended but not
yet formalized.

PGP key for security@zingolabs.org is a TODO pending key generation.
@nachog00 nachog00 requested a review from zancas April 20, 2026 18:08
zancas
zancas previously approved these changes Apr 20, 2026
@zancas
Copy link
Copy Markdown
Member

zancas commented Apr 20, 2026

nvm

zancas and others added 2 commits April 20, 2026 15:47
Proton Mail provides built-in E2EE for Proton-to-Proton senders, with
PGP as a fallback for external senders. PGP key embed is still a TODO
pending export from the Proton account.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants