You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**Informational**| Security improvement; no direct vulnerability | Hardening suggestion or defense-in-depth enhancement |
55
+
56
+
## Response Timeline
57
+
58
+
| Stage | Timeframe |
59
+
|-------|-----------|
60
+
|**Acknowledgment**| Within 48 hours |
61
+
|**Initial Assessment**| Within 7 days |
62
+
|**Resolution Target**| Within 30 days (depending on complexity) |
32
63
33
-
### Response Timeline
64
+
### No Response?
34
65
35
-
-**Acknowledgment**: Within 48 hours
36
-
-**Initial Assessment**: Within 7 days
37
-
-**Resolution Target**: Within 30 days (depending on complexity)
66
+
If you haven't received acknowledgment within 72 hours:
38
67
39
-
### What to Expect
68
+
1. Check your spam/junk folder for our reply
69
+
2. Try the alternative reporting method (email if you used GitHub, or vice versa)
70
+
3. Reach out via hello@acp-protocol.dev with subject line "Security Report Follow-up"
71
+
72
+
## What to Expect
40
73
41
74
1.**Acknowledgment**: We'll confirm receipt of your report
42
75
2.**Assessment**: We'll investigate and determine the severity
43
76
3.**Communication**: We'll keep you informed of our progress
44
77
4.**Resolution**: We'll develop and test a fix
45
78
5.**Disclosure**: We'll coordinate public disclosure with you
46
79
47
-
### Security Considerations for ACP
80
+
### Coordinated Disclosure
81
+
82
+
We follow a coordinated disclosure process:
83
+
84
+
- We request a **90-day disclosure window** from initial report to public disclosure
85
+
- We will credit you in the security advisory (unless you prefer anonymity)
86
+
- We will notify you before any public disclosure
87
+
- If we are unable to resolve the issue within 90 days, we will negotiate an extended timeline
88
+
89
+
## Safe Harbor
90
+
91
+
We consider security research conducted in accordance with this policy to be:
92
+
93
+
-**Authorized** concerning any applicable anti-hacking laws (including CFAA)
94
+
-**Authorized** concerning any relevant anti-circumvention laws (including DMCA)
95
+
-**Exempt** from restrictions in our Terms of Service that would interfere with conducting security research
96
+
-**Lawful** and we will not initiate or support legal action against you for accidental, good-faith violations
97
+
98
+
We will not pursue civil or criminal legal action, or send notices to law enforcement, against researchers who:
99
+
100
+
- Act in good faith to avoid privacy violations, data destruction, or service interruption
101
+
- Only access data necessary to demonstrate the vulnerability
102
+
- Do not exploit vulnerabilities beyond proof-of-concept
103
+
- Report vulnerabilities promptly and provide reasonable time for remediation
104
+
- Do not disclose the issue publicly before coordinated disclosure
48
105
49
-
#### Specification Security
106
+
**If legal action is initiated by a third party against you** for activities conducted in accordance with this policy, we will take steps to make it known that your actions were authorized by us.
107
+
108
+
## Bug Bounty
109
+
110
+
ACP does not currently operate a paid bug bounty program.
111
+
112
+
We offer:
113
+
- Public recognition and acknowledgment for valid reports (with your permission)
114
+
- Inclusion in our Security Hall of Fame (if established)
115
+
- Our sincere gratitude for helping keep the ACP ecosystem secure
116
+
117
+
We may consider monetary rewards for exceptional findings on a case-by-case basis, but this is not guaranteed.
118
+
119
+
## Security Considerations for ACP
120
+
121
+
### Specification Security
50
122
51
123
The ACP specification itself doesn't execute code, but implementations should consider:
52
124
53
-
-**Cache File Integrity**: Cache files could be tampered with
54
-
-**Path Traversal**: File paths in cache should be validated
55
-
-**Variable Injection**: Variable expansion should be sanitized
56
-
-**Constraint Bypass**: Lock constraints are advisory, not enforced
125
+
-**Cache File Integrity**: Cache files could be tampered with to mislead AI tools
126
+
-**Path Traversal**: File paths in cache should be validated to prevent directory escape
127
+
-**Variable Injection**: Variable expansion should be sanitized to prevent injection
128
+
-**Constraint Bypass**: Lock constraints are advisory, not enforced—implementations must not rely on them for security
57
129
58
-
####Implementation Recommendations
130
+
### Implementation Recommendations
59
131
60
132
If you're implementing ACP:
61
133
62
-
1.**Validate all paths** - Don't trust paths in cache files blindly
0 commit comments