avatar
Bug bounty
Public

Sequoia PGP Bug Bounty Program

Securing Open Source Ecosystem

Reward

Bounty
Hall of fame
€500
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000

Program

Avg reward
-
Max reward
-
Scopes
21

Supported languages
English

Hacktivity

Reports
6
1st response
< 1 day
Reports last 24h
-
Reports last week
-
Reports this month
1

Project

Sequoia PGP is a leading provider of secure communication and authentication in the OpenPGP space.

We are committed to protecting the privacy and security of our users with a particular emphasis on the most vulnerable people in our society: activists, journalists, lawyers and their clients.

We are working to achieve this goal by writing specifications, and building libraries and programs for developers, adminstrators, and end users. The specifications that we author, and the software that we author is the sole scope of this bug bounty program.

This bug bounty program is paid for by the Bug Resilience Program.

Program Rules

  • We are convinced that external review by skilled security researchers is crucial to identifying weaknesses in our software.
  • We are pleased to collaborate with you to resolve issues in our specifications and software, and to fairly reward you for the discovery of new security issues.
  • Any type of attacks on our infrastructure, including our source code repositories is prohibited.
  • When you report an issue, we must be able to reproduce it with our setup.
  • An issue reported to us is considered to be a duplicate if it describes a similar attack to a known vulnerability (including issues received outside of YesWeHack) regardless of the component affected. That is, the triage team will use the "One Fix One Reward" process: if two or more programs or libraries use the same code base and a single fix can be deployed to fix all the others' weaknesses, only one issue will be considered as eligible for a reward, and other reports will be closed as Informative. We reward based on vulnerability, not per issue.

Important precautions and limitations

As a complement to the program rules and testing policy:

  • DO NOT include Personally Identifiable Information (PII) in your
    report and please REDACT/OBFUSCATE the PII that is part of your PoC
    (screenshot, terminal transcripts, etc.) as much as possible.
  • DO NOT include secret key material unless that has been created exclusively for testing purposes.

Scopes

Underlying Libraries:

  • buffered-reader: A super-powered Reader underlying our OpenPGP parser.
  • nettle-sys: Low-level Rust bindings for the Nettle cryptographic library.
  • nettle-rs: Rust bindings for the Nettle cryptographic library.
  • SHA1-CD: A library and command-line tool to detect SHA-1 collisions attacks in files.

OpenPGP-related Libraries:

End user programs:

  • sqv: A simple signature verification program.
  • sq: Our primary command-line CLI.
  • sqop: An implementation of the Stateless OpenPGP (SOP) specification.
  • octopus: An alternative OpenPGP backend for Thunderbird.
  • sequoia-git: A tool to check a commit signing policy.

Specifications:

Eligibility

We are happy to thank everyone who submits valid reports that help us improve the security of Sequoia's specifications and software, however, only those that meet the following eligibility requirements may receive a monetary reward:

  • You must be the first reporter of a vulnerability.
  • The vulnerability must be a qualifying vulnerability (see below)
  • You must send a clear textual description of the report along with steps to reproduce the issue, include attachments such as screenshots as necessary. PoC exploit code in the form of a unit test similar in style to those already present in the code (where applicable) is highly appreciated.
  • You must not be a current employee of pEp Apps AG, or one of its contractors.
  • Our analysis is always based on the worst impact demonstrated in your PoC
  • When reviewing source-code, the "main" or "master" branches represent the current versions that are available as packages. Only reports for those branches will be eligible for bounty, if there is a master and main branch, the main branch takes precedence.

Rating and Responsible Disclosure

We use CVSS to rate and categorize vulnerabilities. Any vulnerability will be publicly disclosed after sufficient time has passed for operating system distributions like Debian to deploy updates, and dependant applications to prepare a new release.

Advisories will be published on our mailing-lists, and external mailing-lists like oss-security. When appropriate we will also create an ecosystem-specific advisory. For instance, in the case of Rust code, we will submit an advisory to the rustsec advisory database.

Please understand that we handle the full disclosure process and expect that you do not disclose any findings yourself, we will include researcher credits, if requested.

The process that we follow is described in this document.


Reward

Asset value CVSS
Low
CVSS
Medium
CVSS
High
CVSS
Critical
Medium
€500€3,000€5,000€10,000

Scopes

ScopeTypeAsset value
buffered-reader other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
nettle-sys other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
nettle-rs other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
SHA1-CD other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sequoia-openpgp other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sequoia-autocrypt other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sequoia-ipc other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sequoia-net other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
Shared OpenPGP Certificate Directory other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sequoia-cert-store other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sequoia-wot other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sequoia-policy-config other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
rpm-sequoia other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sqv other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sq other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sqop other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
octopus other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
sequoia-git other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
OpenPGP Cert Directory Specification other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
Web of Trust Specification other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000
Sequoia git Specification other
Medium
Low
€500
Medium
€3,000
High
€5,000
Critical
€10,000

Out of scopes

  • chameleon: https://gitlab.com/sequoia-pgp/sequoia-chameleon-gnupg
  • Anything related to https://sequoia-pgp.org

Vulnerability types

Qualifying vulnerabilities

  • Memory safety issues (e.g. use-after-free, double free, aliasing, out-of-bounds access)
  • Denial of service (e.g. due to crashes / panics, unbounded memory allocation, non-termination, algorithmic complexity attacks) with a full working PoC that demonstrate the real impact
  • Undefined behavior leading to a security vulnerability (e.g. integer overflow)
  • Injection attacks into human-readable and machine-readable output (like SigSpoof)
  • Authentication bypasses (e.g. inadvertently encrypting to the wrong entity, saying a signature-protected message is authentic when it is not)
  • Creation of cryptographic artifacts using high-level interfaces that break or undermine the properties of cryptographic algorithms (e.g. using a null key)
  • Invalid reasoning about OpenPGP certificates (e.g. wrong binding signature used in reasoning)
  • Exfiltration of confidential material (like the eFAIL attack)
  • Diversion of packet streams with respect to another major OpenPGP implementation (i.e. presenting the same material to both and having the parsers disagree about what packets they see)
  • Improper use of cryptographic primitives (e.g. nonce re-use)
  • Improper handling of secret key material (e.g. use of secret key material leading to an exfiltration over a side-channel)

Non-qualifying vulnerabilities

  • Everything not in the qualifiying vulnerabilties list is not accepted
  • Issues only found in outdated versions of our software (i.e. not vulnerable on the HEAD of the main or master branch)
  • Issues found in dependencies, including our cryptographic backend libraries that does not impact directly our project
  • Issues related to weak cryptographic algorithms that are rejected by our standard policy :https://docs.rs/sequoia-openpgp/latest/sequoia_openpgp/policy/struct.StandardPolicy.html in the default configuration on consumption
  • Attacks that incorrectly use our API

Hunters collaboration

When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.

For more information, see help center.
Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.