Products
Open-source
Restaking
dApp
Enterprise Dashboard
Validators
Connect
On-Chain
DeFi
Solutions
Protocols
STAKING
Docs
Products
Solutions
Protocols
STAKING
Docs
This Vulnerability Disclosure Policy outlines the process through which individuals can report vulnerabilities found within our systems, networks, or services. We recognize the value of the security community's efforts in helping us secure our services and are committed to addressing all reported vulnerabilities in a timely manner.
For smart contracts vulnerabilities, Kiln operates dedicated programs with their own reward structure:
The rest of this policy focuses on the scope detailed further down.
Under this policy, "research" means activities in which you:
Once you've established that a vulnerability exists or encounter any sensitive data (including personally identifiable information, financial information, or proprietary information or trade secrets of any party), you must stop your test, notify us immediately, and not disclose this data to anyone else.
The following testing and reporting activities are strictly prohibited:
Though we develop and maintain other internet-accessible systems or services, we ask that active research and testing only be conducted on the systems and services covered by the scope of this document. If there is a particular system not in scope that you think merits testing, please contact us to discuss it first. We will increase the scope of this policy over time.
The following hostnames are included in the scope:
Any service not expressly listed above, such as any connected services, are excluded from scope and are not authorized for testing.
If a vulnerability is specific to the vendor’s platform or infrastructure, researchers are encouraged to report it directly to the vendor in accordance with their disclosure policy.
Depending on the nature of the vulnerability and its impact on our systems, we reserve the right to determine whether a reward will be issued. For example, if the issue is entirely outside our control or requires resolution by the vendor, the reward may not be paid.
If you aren't sure whether a system is in scope or not, contact us at security@kiln.fi before starting your research.
We appreciate your efforts to help us improve our security. However, the following issues are considered out of scope for this program and will not be eligible for rewards. These exclusions include known issues, accepted risks, or areas not prioritized for this program:
robots.txt
or .well-known
directories).X-Frame-Options
headers).We accept vulnerability reports at security@kiln.fi. Reports may be submitted anonymously. If you share contact information, we will acknowledge receipt of your report within 5 business days.
All reports concerning high severity vulnerability and above are required to be encrypted using our PGP public key:
-----BEGIN PGP PUBLIC KEY BLOCK-----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=H7aW
-----END PGP PUBLIC KEY BLOCK-----
In order to help us triage and prioritize submissions, we require that your reports:
When you choose to share your contact information with us, we commit to coordinating with you as openly and as quickly as possible.
This policy is subject to periodic review and may be updated or modified at any time by Kiln without prior notice.
Questions regarding this policy may be sent to security@kiln.fi. We also invite you to contact us with suggestions for improving this policy.