-
-
Notifications
You must be signed in to change notification settings - Fork 129
Eligiblity criteria for meeting bug bounties #503
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@MarcinHoppe @shivasurya @reedloden @sam-github @mhdawson lets work out further ideas and criteria to put this place. This is an important effort regardless of the warm coinbase support as it will set the basis and foundation for hopefully more programs to support us. |
Sure. |
@lirantal It is awesome that we can start fleshing this out. I'd add maintainer opt-in to eligibility criteria, i.e. we don't want to pay when maintainers are not in a position to remediate vulnerabilities in a timely manner. |
@MarcinHoppe it's times like this that I feel GitHub could use the help of threaded discussions :-)
Explain rational? Why would a security researcher's job be impacted by a maintainer's ability to respond in a timely manner? Let's take
Also, maintainer opt-in is hard enough to get and we'd be handling communication all day long instead of triaging and doing other parts of our scope. I think it's great if we actually recognize maintainers themselves who are able to respond in a timely manner and work with us smoothly on this, and in this way incentives other maintainers to follow the same route, as well as increase awareness. |
Recognizing the valid and legit efforts of the researcher ( either by bounty/points/swag ) should be always encouraged, if not this will affect other security researchers to stop searching or analyzing npm/nodejs bugs. //offtopic
|
@lirantal We discussed this a while back in #475 (comment). I was under the impression we reached consensus there, but I am happy to have this discussion one more time :). As for threaded discussions, I think PRs are a decent place to have those :). |
I agree with @MarcinHoppe. I had thought we agreed to focus on modules who opt in as a starting point. It's a matter of getting the best return on the investment. In my mind what we learn working with modules that opt-in will then let us figure out if it makes sense to extend to modules who do not.... |
I'm not saying I disagree but I would ask what are we trying to optimize for with the budget? if we'd want to encourage researchers to be more active on disclosing to the Security WG than other alternatives (i.:e Snyk/npm), or something else? Gonna add it to the criteria which we will anyway visit again in the future but we need to flesh out what does it mean to "opt-in" exactly. |
I think we want to optimize for getting reports on Modules that will fix the reported issues. On "opt-in" we'll need a process by which module maintainers can confirm they would like to be included. The simplest example would be by opening a PR to add to a list of modules which are covered by the bounties. |
Not disagreeing with this but I think it can be quite complex to manage to - it is more lists that needs to be kept up to date. Plus, we're talking about open source projects and maintainers which means we can add package X today but in 6 months there's a report coming in and the maintainer is gone and moved onto other things and isn't responsive. I'm ok with trying this out. We're at an early exploration phase and it's good to experiment and adjust as we learn how this work :) |
Update: funds are in! thank you so much Coinbase ❤️🙏 Currently not having a criteria is blocking us from being able to reward researchers for their efforts.
@nodejs/security-wg |
I think there has been enough discussion to PR criteria text. Its easier to thumbs up or down (or comment on) a specific piece of text.
What we have now is the ones in the issue description? It looks OK in principle to me, but do actual numbers have to be added to 1. and 2.? I'm not really clear on what the process is, and what we need to produce as an input to it. Is it worth just PRing a list of modules we care about? Or are we only going to publish guidelines, and then after a vuln is reported evaluate whether the vuln is bounty worthy? People might want to know up front if the module they are looking at will get bounties. |
@sam-github for simplicity, in a first round I'd rather have a list of module for which we know maintainers |
OK, that sounds like unanimous agreement for starting with a short list. |
WDYT about the following?
|
LGTM. What is "dependents" for module A? It is count of modules which depend on A? Or count of module A depends on? I suspect the former, and I'm not sure we need to consider it, because if 500 modules depend on A, but it still doesn't get more than 1000 downloads a month, we don't care. I think the download count probably gives enough sense of its importance. |
I was thinking about the former indeed, and yeah we can probably leave it out for now. @sam-github can you +1 on #503 (comment) so we can easily track it? |
I'm +1 on #503. I think what we need is a PR capturing the requirements, along with the list of modules to which the bounties apply (which will be empty to start). Once that initial text lands, we can do a public call for module owners to "opt-in" provided that they meet the requirements. We can also reach out specifically to modules we think are important to encourage them to opt-in. |
👍 will PR a new doc for that in the next couple of days |
This was added to the agenda 2 months ago, but was already discussed. Perhaps should move off agenda? |
Oh indeed, I already merged the first proposal for that. |
Uh oh!
There was an error while loading. Please reload this page.
As a follow-up to #475 (comment) we'd like to establish a transparent and collaboratively set criteria of how bug bounties should be carried out by individuals of the Security WG towards the community (bug researchers or package owners).
Criteria levels
Criteria levels will allows us to prioritize specific reports for full, partial or no eligibility of bounties.
Criteria (WIP)
The text was updated successfully, but these errors were encountered: