Skip to content

Security: KertCoin/kert-one

Security

SECURITY.md

🔒 Security Policy for Kert-One At Kert-One, we take the security of our project seriously. We appreciate your efforts to responsibly disclose any vulnerabilities you may find. This document outlines the process for reporting security issues to us.

Reporting a Vulnerability 🚨 If you discover a security vulnerability in Kert-One, please DO NOT open a public GitHub issue for it. Public disclosure can put the project and its users at risk.

Instead, please report it to us privately via:

Email: Kert.@kert-one.com (e.g.,

When reporting, please include as much detail as possible to help us understand and reproduce the issue:

Description: A clear and concise description of the vulnerability.

Steps to Reproduce: Detailed steps on how to trigger the vulnerability.

Impact: What is the potential impact of this vulnerability? (e.g., data breach, denial of service, unauthorized access)

Affected Versions: Which versions or commits of Kert-One are affected?

Proof of Concept (Optional but Recommended): Any code snippets, screenshots, or scripts that demonstrate the vulnerability.

Your Contact Information: (Optional) If you'd like us to be able to reach out for more details or to acknowledge your contribution.

Our Commitment 🤝 Once you've submitted a vulnerability report, here's what you can expect:

Acknowledgement: We will acknowledge receipt of your report within [E.g., 2 business days] of receiving it.

Investigation: Our team will investigate the reported vulnerability.

Communication: We will keep you informed of our progress and any questions we may have during the investigation.

Resolution: We aim to resolve critical vulnerabilities as quickly as possible. The timeline for resolution depends on the severity and complexity of the issue.

Disclosure: Once the vulnerability is resolved, we will coordinate with you on public disclosure, if appropriate, to ensure users are informed and credited.

Responsible Disclosure Guidelines ✔️ We kindly request that you adhere to the following guidelines when reporting security vulnerabilities:

Do not publicly disclose the vulnerability until it has been resolved and we have agreed on a disclosure timeline.

Do not exploit the vulnerability beyond what is necessary to prove its existence.

Do not access or modify data belonging to others.

Do not engage in denial-of-service attacks.

Thank you for helping us keep Kert-One secure!

There aren’t any published security advisories