SECURITY · RESPONSIBLE DISCLOSURE

Security & Disclosure Policy

DCS Labs operates cryptographic infrastructure that real users and government deployments depend on. We take security seriously and welcome coordinated disclosure of any vulnerability you discover.

⚠️ Found a vulnerability? Email us privately

For high-severity issues affecting cryptographic primitives, the on-chain SBT contract, or the receipt chain — please encrypt your report with our PGP key (below). Do not open public GitHub issues for security bugs.

Scope

The following are in scope for coordinated disclosure:

ComponentWhere it lives
R+2 Open Provenance Standarddcslabs.ai/standard
TRDWorkerSBT contractbasescan.org/address/0xbDd1f5fC349D9a8EfCEb07Edbd491233b2540f5F
@trdnetwork/mcp-servernpm registry
@trdnetwork/r2-verifynpm registry
Sovereign Memory APIapi.dcslabs.ai/api/memory/*
Agent Treasury / Settlementapi.dcslabs.ai/api/economy/*
Production web surfacesdcsai.ai, dcslabs.ai, api.dcslabs.ai

Out of scope

Severity classes & expected response time

SeverityExamplesInitial response
CriticalCryptographic primitive break · contract exploit · unauthorized fund movement · receipt forgery< 4 hours
HighAuthentication bypass · arbitrary memory read · privilege escalation< 24 hours
MediumInformation disclosure · CSRF on sensitive actions< 72 hours
LowBest-practice deviations · missing security headers< 7 days

Coordinated disclosure timeline

We aim to publish a security advisory at dcslabs.ai/blog for every fix shipped under this policy.

What we promise reporters

What we ask reporters

Bounty

We don't currently operate a paid bug bounty program (we're solo-founder, pre-revenue). However:

PGP key

For high-severity reports involving cryptographic primitives or the on-chain contract, please encrypt your message with our PGP key.

Fingerprint: TODO — DCS to publish PGP fingerprint by May 24, 2026

Full key: dcslabs.ai/security/pgp.txt (will be published with the launch — current placeholder)

Until the PGP key is published, send via email and we'll respond on a Signal channel for sensitive follow-up.

Security architecture overview

For reviewers preparing audit assessments, the headline architecture is:

Contact

Security: [email protected] · [email protected]

For non-security infrastructure questions: [email protected]