Qanto is committed to ensuring the long-term security of its heterogeneous, post-quantum Layer-0 protocol. As the project is currently in Phase 1 - Foundation (In Progress), no official releases have been published, and thus no versions are currently supported with security updates. This policy outlines our approach to security during development and provides guidance for reporting vulnerabilities as we progress toward testnet and mainnet launches.
As Qanto is in pre-release development, no versions are currently supported with security updates. Once the initial testnet is launched, we will publish a versioning scheme and designate supported versions in this section. Security updates will be provided for all active testnet and mainnet releases, with a deprecation process outlined prior to end-of-life for any version.
How to report a vulnerability, where to go, how often can expect to get an update on a reported vulnerability, what to expect if the vulnerability is accepted or declined, etc.
Qanto welcomes responsible disclosure of security vulnerabilities to strengthen the protocol. To report a vulnerability, please follow these steps:
- Contact the Security Team: Until a dedicated security email is established, submit reports via a GitHub issue marked as "confidential" in the Qanto repository. Include a clear description of the issue, the affected component (e.g.,
qantodag.rs,consensus.rs), steps to reproduce, potential impact, and any proposed mitigation. - Provide Details: Ensure your report includes sufficient technical detail to allow our team to assess the issue.
- Confidentiality: Do not disclose the vulnerability publicly until it has been addressed. We will treat all reports with strict confidentiality.
- Acknowledgment: You will receive an initial confirmation within 48 hours of submission via GitHub or a private communication channel if necessary.
- Assessment: Our security team, in collaboration with the on-chain Intrusion Detection System (IDS) module, will evaluate the report within 7 days.
- Updates: We will provide weekly progress updates (every 7 days) via the same channel used for acknowledgment.
- Resolution: Once validated, vulnerabilities will be patched in the next development milestone, with a timeline communicated to the reporter.
- Accepted Vulnerabilities: If a report is accepted, we will prioritize a fix, integrate it into the codebase, and schedule deployment for the next testnet release. Reporters may be acknowledged (with consent) in the release notes.
- Declined Reports: If a vulnerability is deemed out of scope, non-exploitable, or invalid, we will provide a detailed explanation within 14 days of assessment.
- Coordination: For critical issues (e.g., those affecting post-quantum cryptographic integrity), we may request additional collaboration with the reporter and third-party auditors.
No formal bug bounty program is active during Phase 1. We plan to introduce a rewards system with the testnet launch, with details to be included in the Testnet Launch Plan (docs/testnet_launch_plan.md).
As a pre-release project, Qanto is actively developing its security infrastructure. Key measures include:
- Implementation of lattice-based signatures (CRYSTALS-Dilithium) for post-quantum security.
- Integration of an on-chain IDS to detect validator anomalies.
- Regular code reviews by the core development team.
We are preparing for a comprehensive third-party security audit prior to mainnet launch. The audit plan, including scope and timeline, will be detailed in our Security Audit Plan (docs/security_audit_plan.md) once available.
We encourage the community to contribute to security through code reviews and vulnerability reports. Please refer to our Contribution Guidelines (CONTRIBUTING.md) for participation details. All contributors are expected to adhere to our Code of Conduct.
Reporting vulnerabilities to Qanto implies agreement to act in good faith. Malicious exploitation, public disclosure without coordination, or unauthorized access attempts will be treated as violations of the MIT License and may result in legal action.
For security-related inquiries beyond vulnerability reports, use the Qanto GitHub Discussions until a dedicated contact method is established. For general support, refer to community channels to be announced with the project website (https://Qanto.pro, forthcoming).