This document describes the Talus Labs security team's process for handling security issues across all Talus repositories and services.
IMPORTANT: Please DO NOT open public issues for security-related matters or discuss them in public forums or on social media.
Report security issues to: security-reports@taluslabs.xyz
Include these details in your report:
- Your information: Name and affiliation (if applicable)
- Technical description: Detailed issue explanation with reproduction steps
- Impact assessment: Who can exploit this and what the implications may be
- Visibility status: Whether this vulnerability is public or known to third parties
- Supporting evidence: Relevant logs, screenshots, or proof-of-concept (if safe to share)
For repository-specific issues, use GitHub's private vulnerability reporting:
- Navigate to the repository's "Security" tab
- Click "Report a vulnerability" under Security Advisories
- Complete the form with detailed information
See GitHub's documentation for more information.
For sensitive reports, use our PGP public key:
- Download: https://talus.network/security-pgp-key.txt
- Key Server: keys.openpgp.org
- Fingerprint:
103391C9AE4BE87A85E3EFAE2D4462A29BAB94AE
Always verify the fingerprint before using the key.
The Talus Labs security team will:
- Acknowledge receipt within 72 hours
- Verify and assess the reported vulnerability
- Determine scope including affected versions and impact assessment
- Audit for similar issues to prevent related vulnerabilities
- Develop fixes for all affected production releases
- Coordinate disclosure with ecosystem stakeholders when appropriate
- Deploy fixes following our emergency release procedures
- Publish advisories once fixes are deployed and users can update
- Initial response: Within 72 hours
- Severity assessment: Within 5 business days
- Fix development: Varies by complexity, communicated during assessment
- Public disclosure: After fixes are available and reasonable time for adoption
Security issues may trigger our Incident Management Plan, particularly for:
- Active exploits affecting user funds or data
- Platform-wide vulnerabilities
- Critical infrastructure compromises
In such cases, response times may be accelerated and additional coordination procedures activated.
Please help us handle security issues effectively by:
- Allow reasonable time for our team to respond and address issues
- Coordinate disclosure timing to ensure users can protect themselves
- Provide clear communication throughout the process
- Avoid exploitation of discovered vulnerabilities
- Demonstrate good faith by not disrupting services, data, or communities
- Respect privacy and avoid accessing user data
- Follow applicable laws in your research activities
Talus Labs is committed to working constructively with security researchers and the broader security community.
When conducting vulnerability research according to this policy, we consider such research to be:
- Authorized under applicable computer fraud and abuse laws
- Exempt from Terms of Service restrictions that would interfere with security research
- Lawful and beneficial when conducted in good faith and compliance with applicable laws
This safe harbor applies to security research on:
- Talus Labs infrastructure and operated services
- Nexus platform and related open source software
- Public-facing applications and websites operated by Talus Labs
- Smart contracts deployed by Talus Labs
To qualify for safe harbor protection, research must:
- Avoid privacy violations and data access/modification
- Prevent service disruption or data destruction
- Exclude social engineering against employees or community members
- Provide reasonable disclosure time before any public disclosure
- Comply with applicable laws and agreements
- Platform vulnerabilities: Nexus protocol and infrastructure
- Smart contract issues: Logic flaws, economic exploits, access control
- Infrastructure security: API endpoints, authentication, data handling
- Dependency vulnerabilities: Third-party library issues affecting our services
- Configuration issues: Misconfigurations leading to security exposure
- Social engineering attacks on staff or users
- Physical security of office locations
- Distributed denial of service (DDoS) attacks
- Spam or content-based attacks
- Issues in third-party services not controlled by Talus Labs
From time to time we may operate formal bug bounty programs. We may publish these on our web site, social media or other formal communication channels.
We recognize valuable security research through:
- Public acknowledgment in security advisories (with your permission)
- Direct communication with our security team
- Community recognition when appropriate
- Swag and merchandise for significant contributions
For questions about this security policy or the reporting process:
- Email: security-reports@taluslabs.xyz
- General security discussions: Use GitHub Discussions in relevant repositories
Last updated: 2025-09-22 Version: 2.0
This policy is regularly reviewed and updated to reflect our evolving security practices and community needs.