{% extends "global/layout.html" %} {% block title %}{{ _('Vulnerability Response Process') }}{% endblock %} {% block lastupdated %}2020-06{% endblock %} {% block content_id %}vrp{% endblock %} {% block content %}
{% trans %} This process is subject to change. Please refer to this page for the current VRP. {%- endtrans %}
{% trans %}This page was last updated in June 2020.{%- endtrans %}
{% trans %}Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data centers{%- endtrans %}
{% trans %}As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is.{%- endtrans %}
{% trans -%} Echelon is the trusted security point-of-contact. He forwards e-mails to team members as appropriate. {%- endtrans %}
{% trans -%} Any further questions or resolutions regarding the incident(s) between the researcher and response + development team after public disclosure can be addressed via the following: {%- endtrans %}