Aegis Network is security infrastructure for DeFi. We take security seriously and appreciate responsible disclosure of vulnerabilities.
| Package | Version | Supported |
|---|---|---|
| sentinel-brain | 0.1.x | Yes |
| sentinel-core | 0.1.x | Yes |
| sentinel-node | 0.1.x | Yes |
Do not open public GitHub issues for security vulnerabilities.
-
Email: Send details to
biangulo43@gmail.com(or create a private security advisory on GitHub) -
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (optional)
-
Response Timeline:
- Initial response: 24-48 hours
- Status update: within 7 days
- Fix timeline: depends on severity
| Severity | Description | Example |
|---|---|---|
| Critical | Immediate fund loss risk | Smart contract drain, signature bypass |
| High | Significant security impact | False positive manipulation, consensus attack |
| Medium | Limited security impact | DoS vector, information disclosure |
| Low | Minimal security impact | Edge case bugs, minor issues |
- Smart contracts (
sentinel-core/src/) - Node software (
sentinel-node/) - AI/ML inference engine (
sentinel-brain/) - Cryptographic implementations (BLS signatures)
- P2P network protocol
- Third-party dependencies (report upstream)
- Issues in test files only
- Documentation typos
- Social engineering attacks
We plan to launch a bug bounty program. Details coming soon.
| Severity | Reward Range |
|---|---|
| Critical | $10,000 - $50,000 |
| High | $5,000 - $10,000 |
| Medium | $1,000 - $5,000 |
| Low | $100 - $1,000 |
- Store BLS private keys securely (HSM recommended for production)
- Use dedicated machines for node operation
- Keep software updated
- Monitor node logs for anomalies
- Use firewalls to restrict P2P port access
- Implement
ISentinelinterface correctly - Test pause/unpause functionality thoroughly
- Set appropriate access controls on
unpause() - Monitor
SentinelShieldbounty deposits
- BLS signature verification uses BN254 precompiles (EIP-196, EIP-197)
- Optimistic verification has 48-hour dispute window
- 21-day unstaking cooldown prevents stake-and-slash attacks
- gRPC connections to inference server are unencrypted by default
- P2P gossip messages are signed but not encrypted
- Local heuristic fallback may have different detection rates
- Model trained on historical exploits may not detect novel attacks
- Adversarial inputs could potentially evade detection
- False positives trigger 48-hour bounty dispute process
Audit reports will be published in /audits directory once completed.
- Security issues:
biangulo43@gmail.com - General questions: Open a GitHub Discussion