The TeachLink team takes security seriously. As a smart contract project handling tokenized rewards and cross-chain bridging, we understand the critical importance of security. We appreciate the security community's efforts in helping us maintain a secure platform.
| Version | Supported |
|---|---|
| main | ✅ |
| testnet | ✅ |
| < 1.0 | ❌ |
DO NOT open a public GitHub issue for security vulnerabilities. Instead:
-
GitHub Security Advisories (Preferred)
- Navigate to Security Advisories
- Click "Report a vulnerability"
- Fill out the private report form
-
Email
- Send details to: security@teachlink.io
- Use PGP encryption if available (key below)
- Subject:
[SECURITY] Brief description
-----BEGIN PGP PUBLIC KEY BLOCK-----
[PGP Key will be added upon project launch]
-----END PGP PUBLIC KEY BLOCK-----
Please provide as much information as possible:
-
Vulnerability Type
- Smart contract vulnerability
- Access control issue
- Reentrancy vulnerability
- Integer overflow/underflow
- Denial of service
- Cross-chain bridge vulnerability
- Other
-
Description
- Clear explanation of the vulnerability
- Affected components/functions
- Potential impact
-
Reproduction Steps
- Step-by-step instructions
- Proof of concept (if possible)
- Test environment details
-
Impact Assessment
- Who is affected
- Potential financial impact
- Exploitability assessment
-
Suggested Fix (optional)
- Your recommended remediation
| Stage | Timeline |
|---|---|
| Initial Response | Within 24 hours |
| Triage & Assessment | Within 72 hours |
| Status Update | Weekly until resolved |
| Fix Development | Depends on severity |
| Public Disclosure | After fix is deployed |
- Direct theft of user funds
- Unauthorized minting/burning of tokens
- Bridge manipulation allowing double-spending
- Complete contract takeover
Response: Immediate team mobilization, potential emergency pause
- Partial loss of funds
- Bypass of access controls
- Manipulation of reward calculations
- Significant denial of service
Response: Priority fix within 7 days
- Limited impact vulnerabilities
- Information disclosure
- Non-critical access control issues
- Temporary denial of service
Response: Fix within 30 days
- Minor issues
- Best practice violations
- Theoretical vulnerabilities
Response: Fix in next release cycle
We offer rewards for responsibly disclosed vulnerabilities:
| Severity | Reward Range |
|---|---|
| Critical | 5,000 - 25,000 TEACH |
| High | 2,000 - 5,000 TEACH |
| Medium | 500 - 2,000 TEACH |
| Low | 100 - 500 TEACH |
To be eligible for a bounty:
- First reporter of the vulnerability
- Report follows responsible disclosure
- Vulnerability is in-scope (see below)
- No exploitation of the vulnerability
- Compliance with our Code of Conduct
- TeachLink smart contracts (
contracts/teachlink/) - Insurance contracts (
contracts/insurance/) - Bridge functionality
- Escrow mechanisms
- Access control and authorization
- Third-party services and dependencies
- Social engineering attacks
- Physical attacks
- Issues already reported
- Issues in deprecated code
- Frontend/UI vulnerabilities (unless leading to contract exploitation)
- Theoretical vulnerabilities without practical impact
-
Verify Contract Addresses
- Always verify you're interacting with official contracts
- Check addresses against our documentation
-
Review Transactions
- Carefully review transaction details before signing
- Use hardware wallets for significant amounts
-
Stay Updated
- Follow official channels for security announcements
- Keep your wallet software updated
-
Code Review
- All code changes require review
- Security-sensitive changes require additional review
-
Testing
- Comprehensive unit tests
- Integration tests for cross-module interactions
- Fuzz testing for edge cases
-
Audits
- Regular security audits by reputable firms
- Audit reports published in
/docs/audits/
-
Dependencies
- Regular dependency updates
- Security scanning of dependencies
- Minimal dependency footprint
- Access Control: Role-based permissions with multi-sig for critical functions
- Input Validation: Comprehensive input validation on all external functions
- Reentrancy Guards: Protection against reentrancy attacks
- Integer Safety: Use of checked arithmetic
- Upgrade Pattern: Careful consideration of upgradeability (if applicable)
- Key Management: Secure key storage and rotation procedures
- Monitoring: Real-time monitoring of contract activity
- Incident Response: Documented incident response procedures
- Emergency Pause: Ability to pause contracts in emergencies
| Date | Auditor | Scope | Report |
|---|---|---|---|
| TBD | TBD | Full Contract Audit | [Link] |
Audit reports will be published upon completion.
- Security Team: security@teachlink.io
- Bug Bounty: bounty@teachlink.io
- PGP Key: [Available upon request]
We thank all security researchers who have helped improve TeachLink's security. Contributors who report valid vulnerabilities will be recognized in our Hall of Fame.
This security policy may be updated periodically. Major changes will be announced through official channels.
Last updated: January 2026