You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* We are committed to providing a friendly, safe and welcoming environment for all, regardless of level of experience, gender, gender identity and expression, sexual orientation, disability, personal appearance, body size, race, ethnicity, age, religion, nationality, or other similar characteristic.
@@ -29,6 +31,7 @@ This code of conduct applies to all projects run by the Tendermint/COSMOS team a
29
31
30
32
31
33
# Moderation
34
+
32
35
These are the policies for upholding our community’s standards of conduct. If you feel that a thread needs moderation, please contact the above mentioned person.
33
36
34
37
1. Remarks that violate the Tendermint/COSMOS standards of conduct, including hateful, hurtful, oppressive, or exclusionary remarks, are not allowed. (Cursing is allowed, but never targeting another user, and never in a hateful manner.)
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,14 +115,14 @@ There are two ways to generate your proto stubs.
115
115
116
116
### Installation Instructions
117
117
118
-
To install `protoc`, download an appropriate release (https://github.com/protocolbuffers/protobuf) and then move the provided binaries into your PATH (follow instructions in README included with the download).
118
+
To install `protoc`, download an appropriate release (<https://github.com/protocolbuffers/protobuf>) and then move the provided binaries into your PATH (follow instructions in README included with the download).
119
119
120
120
To install `gogoproto`, do the following:
121
121
122
-
```
123
-
$ go get github.com/gogo/protobuf/gogoproto
124
-
$ cd $GOPATH/pkg/mod/github.com/gogo/[email protected] # or wherever go get installs things
125
-
$ make install
122
+
```sh
123
+
go get github.com/gogo/protobuf/gogoproto
124
+
cd$GOPATH/pkg/mod/github.com/gogo/[email protected]# or wherever go get installs things
125
+
make install
126
126
```
127
127
128
128
You should now be able to run `make proto-gen` from inside the root Tendermint directory to generate new files from proto files.
@@ -135,7 +135,7 @@ hacking Tendermint with the commands below.
135
135
NOTE: In case you installed Vagrant in 2017, you might need to run
136
136
`vagrant box update` to upgrade to the latest `ubuntu/xenial64`.
137
137
138
-
```
138
+
```sh
139
139
vagrant up
140
140
vagrant ssh
141
141
make test
@@ -218,7 +218,7 @@ If your change should be included in a minor release, please also open a PR agai
218
218
219
219
You can do this by cherry-picking your commit off master:
220
220
221
-
```
221
+
```sh
222
222
$ git checkout rc1/v0.33.5
223
223
$ git checkout -b {new branch name}
224
224
$ git cherry-pick {commit SHA from master}
@@ -232,7 +232,7 @@ After this, you can open a PR. Please note in the PR body if there were merge co
232
232
233
233
We follow the [Go style guide on commit messages](https://tip.golang.org/doc/contribute.html#commit_messages). Write concise commits that start with the package name and have a description that finishes the sentence "This change modifies Tendermint to...". For example,
234
234
235
-
```
235
+
```sh
236
236
cmd/debug: execute p.Signal only when p is not nil
Copy file name to clipboardExpand all lines: DOCKER/README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,12 +8,12 @@ Official releases can be found [here](https://github.com/tendermint/tendermint/r
8
8
9
9
The Dockerfile for tendermint is not expected to change in the near future. The master file used for all builds can be found [here](https://raw.githubusercontent.com/tendermint/tendermint/master/DOCKER/Dockerfile).
10
10
11
-
Respective versioned files can be found https://raw.githubusercontent.com/tendermint/tendermint/vX.XX.XX/DOCKER/Dockerfile (replace the Xs with the version number).
11
+
Respective versioned files can be found <https://raw.githubusercontent.com/tendermint/tendermint/vX.XX.XX/DOCKER/Dockerfile> (replace the Xs with the version number).
12
12
13
13
## Quick reference
14
14
15
-
-**Where to get help:**https://tendermint.com/
16
-
-**Where to file issues:**https://github.com/tendermint/tendermint/issues
15
+
-**Where to get help:**<https://tendermint.com/>
16
+
-**Where to file issues:**<https://github.com/tendermint/tendermint/issues>
17
17
-**Supported Docker versions:**[the latest release](https://github.com/moby/moby/releases) (down to 1.6 on a best-effort basis)
Copy file name to clipboardExpand all lines: SECURITY.md
+9-3Lines changed: 9 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,7 @@
1
1
# Security
2
2
3
3
## Reporting a Bug
4
+
4
5
As part of our [Coordinated Vulnerability Disclosure
5
6
Policy](https://tendermint.com/security), we operate a [bug
6
7
bounty](https://hackerone.com/tendermint).
@@ -21,6 +22,7 @@ If you follow these guidelines when reporting an issue to us, we commit to:
21
22
* Work with you to understand, resolve and ultimately disclose the issue in a timely fashion
22
23
23
24
## Disclosure Process
25
+
24
26
Tendermint Core uses the following disclosure process:
25
27
26
28
1. Once a security report is received, the Tendermint Core team works to verify the issue and confirm its severity level using CVSS.
@@ -37,6 +39,7 @@ Tendermint Core uses the following disclosure process:
37
39
This process can take some time. Every effort will be made to handle the bug in as timely a manner as possible, however it's important that we follow the process described above to ensure that disclosures are handled consistently and to keep Tendermint Core and its downstream dependent projects--including but not limited to Gaia and the Cosmos Hub--as secure as possible.
38
40
39
41
### Example Timeline
42
+
40
43
The following is an example timeline for the triage and response. The required roles and team members are described in parentheses after each task; however, multiple people can play each role and each person may play multiple roles.
41
44
42
45
#### > 24 Hours Before Release Time
@@ -54,6 +57,7 @@ The following is an example timeline for the triage and response. The required r
54
57
4. Send emails to validators or other users (PARTNERSHIPS LEAD)
2. Cut Cosmos SDK release for eligible versions (COSMOS ENG)
59
63
3. Cut Gaia release for eligible versions (GAIA ENG)
@@ -64,26 +68,31 @@ The following is an example timeline for the triage and response. The required r
64
68
8. Publish Security Advisory and CVE, if CVE has no sensitive information (ADMIN)
65
69
66
70
#### After Release Time
71
+
67
72
1. Write forum post with exploit details (TENDERMINT LEAD)
68
73
2. Approve pay-out on HackerOne for submitter (ADMIN)
69
74
70
75
#### 7 Days After Release Time
76
+
71
77
1. Publish CVE if it has not yet been published (ADMIN)
72
78
2. Publish forum post with exploit details (TENDERMINT ENG, TENDERMINT LEAD)
73
79
74
80
## Supported Releases
81
+
75
82
The Tendermint Core team commits to releasing security patch releases for both the latest minor release as well for the major/minor release that the Cosmos Hub is running.
76
83
77
84
If you are running older versions of Tendermint Core, we encourage you to upgrade at your earliest opportunity so that you can receive security patches directly from the Tendermint repo. While you are welcome to backport security patches to older versions for your own use, we will not publish or promote these backports.
78
85
79
86
## Scope
87
+
80
88
The full scope of our bug bounty program is outlined on our [Hacker One program page](https://hackerone.com/tendermint). Please also note that, in the interest of the safety of our users and staff, a few things are explicitly excluded from scope:
81
89
82
90
* Any third-party services
83
91
* Findings from physical testing, such as office access
84
92
* Findings derived from social engineering (e.g., phishing)
85
93
86
94
## Example Vulnerabilities
95
+
87
96
The following is a list of examples of the kinds of vulnerabilities that we’re most interested in. It is not exhaustive: there are other kinds of issues we may also be interested in!
88
97
89
98
### Specification
@@ -143,6 +152,3 @@ Attacks may come through the P2P network or the RPC layer:
0 commit comments