Find and report vulnerabilities to secure the software supply chain
for valid
vulnerability reports
OSS contributors receive and evaluate vulnerability reports
Users hunt for software vulnerabilities and submit reports
The happy path, project maintainers take action
Left on the shelf, vulnerability report is not addressed
Incentivized vulnerability
reporting
Staked tokens at risk
Reporting OSS vulnerabilities requires users to stake tokens to a bug report to prevent spam and protect project maintainers. Anyone who submits a valid report may receive rewards if the vulnerability is confirmed—regardless of whether the bug is ultimately resolved.
Remediation timeline
Every submitted vulnerability report is accompanied by a governance-defined timeline for the OSS project maintainer to address or resolve the software vulnerability. The first step is for the project maintainer to confirm the validity of the bug report.
Penalties for non-response
The tea Protocol incentivizes prompt and thorough responses to vulnerability reporting. Project maintainers who do not acknowledge or resolve reported issues in a timely manner may be penalized by a token-slashing event. Token slashing also impacts a project’s stakers.