The following versions of VeritasChain Protocol (VCP) are currently supported with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of VeritasChain Protocol seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
If you prefer encrypted communication, please contact us first to obtain our PGP key.
Please include the following information in your report:
- Type of vulnerability (e.g., buffer overflow, SQL injection, cross-site scripting)
- Affected component(s) (e.g., VCP Explorer API, SDK, Sidecar integration)
- Full paths of source file(s) related to the vulnerability (if known)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if available)
- Impact assessment of the vulnerability
- Any potential mitigations you have identified
| Action | Timeline |
|---|---|
| Initial response | Within 48 hours |
| Status update | Within 7 days |
| Vulnerability assessment | Within 14 days |
| Fix development | Depends on severity |
| Public disclosure | After fix is released |
-
Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
-
Communication: We will keep you informed about the progress of addressing the vulnerability.
-
Assessment: Our security team will investigate and assess the impact of the reported vulnerability.
-
Resolution: We will work on a fix and coordinate the release timeline with you.
-
Credit: If you wish, we will publicly acknowledge your responsible disclosure in our release notes.
When implementing VCP in your systems, please follow these security best practices:
- Ed25519 Signatures: Use only compliant Ed25519 implementations
- SHA-256 Hash Chains: Ensure proper hash chain validation
- Merkle Proofs: Verify RFC 6962 compliance for all Merkle tree operations
- Key Management: Store private keys securely, never in source code or public repositories
- Use HTTPS for all API communications
- Implement proper authentication and authorization
- Rate limit API requests to prevent abuse
- Validate all input data before processing
- Encrypt sensitive data at rest and in transit
- Implement proper access controls
- Maintain audit logs for all security-relevant operations
- Follow GDPR, MiFID II, and other applicable regulations
Security updates are released as needed. To stay informed:
- ⭐ Star and Watch our repositories on GitHub
- 📧 Subscribe to security announcements at info@veritaschain.org
- 🌐 Visit https://veritaschain.org for the latest updates
This security policy applies to the following repositories:
- vcp-spec - VCP Specification
- vcp-explorer-api - Explorer API
- vcp-explorer-gui - Explorer GUI
- vcp-sdk-spec - SDK Specification
- vcp-sidecar-guide - Sidecar Integration Guide
- vcp-site - Official Website
We appreciate the security research community's efforts in helping us maintain the security of VeritasChain Protocol. Responsible disclosure helps protect our users and the broader ecosystem.
VeritasChain Standards Organization
"Verify, Don't Trust"