Responsible Disclosure Program
Noxys has a commitment to responsible security research and vulnerability disclosure.
Our Commitment
We believe in:
- Transparency: We acknowledge all security researchers
- Timeliness: Critical fixes within 48 hours
- Fairness: Sufficient time to develop and release fixes before public disclosure
- Recognition: Credit researchers in security advisories
Reporting a Vulnerability
Do's and Don'ts
DO:
- Email security@noxys.eu with vulnerability details
- Include reproduction steps and affected versions
- Provide suggested fix (optional)
- Be respectful and professional
- Give us reasonable time to respond
DON'T:
- Post vulnerability to GitHub issues or public forums
- Disclose to media or other platforms first
- Exploit the vulnerability beyond what's needed for proof-of-concept
- Share the vulnerability with other researchers without permission
- Access data you're not authorized to access
Reporting Process
1. Initial Report
Email security@noxys.eu with:
Subject: [SECURITY] Vulnerability in Noxys [version]
Description:
- Vulnerability type (e.g., SQL injection, XSS, authentication bypass)
- Affected component(s)
- Affected version(s)
- Severity assessment (critical, high, medium, low)
Reproduction Steps:
1. [Step 1]
2. [Step 2]
3. [Step 3]
Impact:
- What can an attacker do?
- What data could be compromised?
Proof of Concept:
[Code or detailed steps to reproduce]
Suggested Fix (optional):
[Your proposed solution, if you have one]
Your Contact Information:
- Name
- Email
- PGP key (optional)
- GitHub profile (optional)
2. Acknowledgment
We will respond within 1 hour (critical) or 24 hours (non-critical) with:
- Confirmation we received the report
- Initial severity assessment
- Expected timeline for fix
- Security researcher credit (if desired)
3. Investigation
Our security team will:
- Reproduce the vulnerability
- Assess impact and severity
- Develop a fix
- Test the fix
- Plan the release
4. Coordination
We'll keep you updated on:
- Progress on developing a fix
- Estimated release date
- Planned advisory release
- Your credit/attribution
5. Public Disclosure
After fix is released, we will:
- Publish security advisory at https://security.noxys.eu
- Include your name (if you want credit)
- Detail the vulnerability
- Thank you in acknowledgments section
Disclosure Timeline
Critical Vulnerabilities
Definition: Remote code execution, authentication bypass, complete data compromise
| Timeline | Activity |
|---|---|
| Hour 1 | Acknowledge receipt |
| Hour 24 | Initial assessment, begin fix |
| Hour 48 | Security patch released |
| Hour 72 | Public advisory published |
High-Severity Vulnerabilities
Definition: Significant security impact (privilege escalation, data leak)
| Timeline | Activity |
|---|---|
| Hour 24 | Acknowledge receipt |
| Day 5 | Fix released |
| Day 7 | Public advisory published |
Medium-Severity Vulnerabilities
Definition: Limited impact, requires specific conditions
| Timeline | Activity |
|---|---|
| Day 1 | Acknowledge receipt |
| Day 10 | Fix released |
| Day 14 | Public advisory published |
Low-Severity Vulnerabilities
Definition: Minimal impact or requires special access
| Timeline | Activity |
|---|---|
| Day 3 | Acknowledge receipt |
| Day 30 | Fix released in next version |
| Day 60 | Public advisory published |
Security Advisory Format
Our public security advisories include:
# Noxys Security Advisory [GHSA-XXXX-XXXX-XXXX]
## Vulnerability: [Title]
**Severity**: High / Critical / Medium / Low
**Affected Versions**: v0.2.0 - v0.2.5
**Fixed Version**: v0.2.6
## Summary
[Clear description of the vulnerability]
## Impact
[What could an attacker do?]
## Mitigation
For users unable to upgrade immediately:
- [Temporary mitigation steps if available]
## Acknowledgment
Thank you to [Researcher Name] for responsibly disclosing this vulnerability.
## References
- [CVSS v3.1 Score: X.X]
- [CWE-XXX: Vulnerability Type]
- [GitHub commit: abc123def456]
## Remediation
**Upgrade to v0.2.6 immediately** or apply temporary mitigation steps above.
Severity Ratings
We use CVSS v3.1 for severity assessment:
| CVSS Score | Severity | Example |
|---|---|---|
| 9.0-10.0 | Critical | RCE, auth bypass |
| 7.0-8.9 | High | SQL injection, data leak |
| 4.0-6.9 | Medium | Privilege escalation, denial of service |
| 0.1-3.9 | Low | Information disclosure, XSS |
Out of Scope
The following are out of scope for our disclosure program:
- Social engineering (but report to security@noxys.eu anyway)
- Physical security (report to physical-security@noxys.eu)
- Denial of service (rate-limited APIs only)
- Spam (report to abuse@noxys.eu)
- Vulnerabilities in dependencies (report to maintainers)
- Third-party services (report to the vendor)
In Scope
- Application code (noxys/proxy, noxys/console, noxys/extension)
- API authentication and authorization
- Database security
- Encryption implementation
- Infrastructure security (cloud deployments)
Security Researcher Policy
What We Provide
- Credit: Public acknowledgment in security advisories
- Transparency: Detailed explanation of the vulnerability
- Bounty: Currently, recognition only (formal bounty program coming)
Researcher Responsibilities
- Confidentiality: Do not disclose before agreed timeline
- Legal Compliance: Test only on Noxys systems you control
- Professionalism: Communicate respectfully
- Patience: Allow reasonable time for fix development
Public Vulnerability Database
All disclosed vulnerabilities are published in:
- GitHub Security Advisories: https://github.com/noxys-io/noxys/security/advisories
- Noxys Security Portal: https://security.noxys.eu
- CVE Database: https://cve.mitre.org (after public disclosure)
- NVD (National Vulnerability Database): https://nvd.nist.gov
Bug Bounty Program (Roadmap)
Formal bug bounty program coming in 2026:
- Scope: Application code + infrastructure
- Rewards: €500 - €5,000 depending on severity
- Platform: HackerOne or Bugcrowd (TBD)
Check back soon or email security@noxys.eu for updates.
Contact Information
Security Team
- Email: security@noxys.eu
- PGP Key: [Available on request]
- Response Time: 1-24 hours depending on severity
- Confidentiality: All reports treated as confidential until disclosed
Other Contacts
- Privacy Issues: privacy@noxys.eu
- Physical Security: physical-security@noxys.eu
- Abuse: abuse@noxys.eu
- Legal: legal@noxys.eu
Security Researcher Acknowledgments
We thank the following security researchers for responsibly disclosing vulnerabilities:
2026
- March 2026: [Researcher Name] - XSS in API response (GHSA-2026-0001)
- February 2026: [Researcher Name] - Authentication bypass (GHSA-2026-0002)
[More to come as disclosures are resolved]
Frequently Asked Questions
Q: How long should I wait before public disclosure?
A: Follow our timeline above:
- Critical: 72 hours after fix release
- High: 14 days after fix release
- Medium/Low: 30+ days after fix release
If we're unresponsive, you may disclose after 90 days.
Q: Can I discuss the vulnerability with other researchers?
A: No, without explicit permission from Noxys. This maintains the coordinated disclosure process.
Q: Will I receive credit?
A: Yes, if you want it. We include your name (or pseudonym) in:
- Security advisory
- GitHub commit message
- Security researcher list
Q: What if I disagree with your severity assessment?
A: Let's discuss. Email security@noxys.eu with your reasoning. CVSS scores are objective, but context matters.
Q: What if you don't fix it?
A: If we deem something not a vulnerability or won't fix:
- We'll explain our reasoning
- You can request a second opinion
- After 90 days, you may disclose publicly
Q: Do you test the fix before release?
A: Yes, thoroughly:
- Unit tests for the fix
- Integration tests
- Security regression testing
- Staging environment validation
- Limited rollout to early customers
Additional Resources
- OWASP Top 10: https://owasp.org/Top10/
- CWE (Common Weakness Enumeration): https://cwe.mitre.org/
- CVSS v3.1 Calculator: https://www.first.org/cvss/calculator/3.1
- Security Headers: https://securityheaders.com/
Next Steps
Thank you for helping keep Noxys secure.
Email security@noxys.eu with any questions about this program.