RiskState welcomes security research and confidential vulnerability reports. This page is the canonical disclosure policy. The machine-readable version lives at /.well-known/security.txt per RFC 9116.
| Channel | Use |
|---|---|
security@likido.xyz | Confidential security reports. Preferred channel. |
hello@likido.xyz | General inquiries, contracts, GDPR DSAR |
If you need PGP, ask via security@likido.xyz and we will exchange a key out-of-band.
| Step | Target |
|---|---|
| First acknowledgement | Within 72 hours |
| Triage status update | Within 7 days of acknowledgement |
| Resolution + public advisory (if confirmed) | Within 30 days for production-impact issues |
Response times are measured against business days where local holidays apply. We confirm in writing.
In scope:
https://riskstate.aihttps://riskstate.netlify.app/v1/* and /v2/*@riskstate/mcp-serverOut of scope:
Examples of in-scope reports:
/v1/* or /v2/* (e.g. accessing audit records without a valid Bearer token).policy_config enforcement that loosens the engine's caps (a "tighten only" violation).policy_hash that produces non-deterministic output for identical inputs and reference_time.riskstate.ai.What is not a vulnerability:
score_v3 engine's policy output disagreeing with your view of the market. The engine is documented in Methodology; disputes about scoring are not security issues.These will not be tolerated and may result in legal action:
We follow a coordinated disclosure model. After triage:
/docs/research and credit you (unless you request anonymity).We do not pay bounties today. We do credit researchers in advisories and, for impactful reports, write a public thank-you. Once we have a paid plan, a bounty programme will follow.
Send to security@likido.xyz:
Subject: [SECURITY] <one-line summary>
Affected component: <e.g. POST /v1/risk-state, GET /v2/audit/decisions, ...>
Vulnerability class: <e.g. authn bypass, IDOR, injection, logic bug>
Severity (your assessment): <CRITICAL | HIGH | MEDIUM | LOW>
Reproduction steps:
1. ...
2. ...
3. ...
Expected behaviour: ...
Observed behaviour: ...
Proof of concept: <minimal payload, screenshots, request/response>
Reporter: <name or pseudonym; whether you want public credit>
A short, reproducible report beats a long speculative one.
No external findings to date. We will list confirmed reporters here unless they request anonymity.
This document and the /.well-known/security.txt file are reviewed at least annually. Last review: 2026-04-28.