Security Disclosure

RiskState welcomes security research and confidential vulnerability reports. This page is the canonical disclosure policy. The machine-readable version lives at /.well-known/security.txt per RFC 9116.

Contact

ChannelUse
security@likido.xyzConfidential security reports. Preferred channel.
hello@likido.xyzGeneral inquiries, contracts, GDPR DSAR

If you need PGP, ask via security@likido.xyz and we will exchange a key out-of-band.

Response SLA

StepTarget
First acknowledgementWithin 72 hours
Triage status updateWithin 7 days of acknowledgement
Resolution + public advisory (if confirmed)Within 30 days for production-impact issues

Response times are measured against business days where local holidays apply. We confirm in writing.

Scope

In scope:

Out of scope:

What constitutes a vulnerability

Examples of in-scope reports:

What is not a vulnerability:

Hard NO

These will not be tolerated and may result in legal action:

Coordinated disclosure

We follow a coordinated disclosure model. After triage:

  1. We confirm the issue and an estimated remediation timeline.
  2. You agree to hold publication until we have shipped the fix and notified affected customers (if any).
  3. We publish a public advisory at our blog / /docs/research and credit you (unless you request anonymity).
  4. If we cannot reach the 30-day window for a complex fix, we coordinate a longer hold with you in writing.

We do not pay bounties today. We do credit researchers in advisories and, for impactful reports, write a public thank-you. Once we have a paid plan, a bounty programme will follow.

Reporting template

Send to security@likido.xyz:

Subject: [SECURITY] <one-line summary>

Affected component: <e.g. POST /v1/risk-state, GET /v2/audit/decisions, ...>
Vulnerability class: <e.g. authn bypass, IDOR, injection, logic bug>
Severity (your assessment): <CRITICAL | HIGH | MEDIUM | LOW>
Reproduction steps:
  1. ...
  2. ...
  3. ...
Expected behaviour: ...
Observed behaviour: ...
Proof of concept: <minimal payload, screenshots, request/response>
Reporter: <name or pseudonym; whether you want public credit>

A short, reproducible report beats a long speculative one.

Acknowledgements

No external findings to date. We will list confirmed reporters here unless they request anonymity.

Related


This document and the /.well-known/security.txt file are reviewed at least annually. Last review: 2026-04-28.