Security
Tally Security Vulnerability Disclosure Policy
At Tally, we take security seriously and value the contributions of security researchers who help keep our platform and users safe. This policy provides guidelines for conducting security research and reporting vulnerabilities responsibly.
To report a vulnerability, reach out to security@tally.xyz
Scope
In Scope
Main application at tally.xyz
Associated subdomains
API endpoints
Web application functionality
Authentication mechanisms
Smart contract interactions
Out of Scope
Denial of Service (DoS) attacks
Spam attacks
Social engineering attacks
Physical security attacks
Third-party applications or websites
Issues already reported by another researcher
Issues in third-party dependencies that are already publicly known
Guidelines for Security Researchers
Do No Harm:
Do not attempt to access, modify, or delete data belonging to other users
Do not attempt to degrade or disrupt our services
Do not use automated scanning tools without explicit permission
Do not attempt to phish or social engineer our employees or users
Testing Requirements:
Only test against accounts you own or have explicit permission to test
Create a separate test account for security research
Do not test in a way that could impact other users or the platform's stability
Immediately stop testing if you encounter sensitive user data
Reporting Process
Initial Report: Submit your findings through our secure bug reporting platform or email security@tally.xyz with:
Detailed description of the vulnerability
Steps to reproduce
Proof of concept
Impact assessment
Suggested remediation (if any)
Response Timeline:
Initial acknowledgment: Within 24 hours
Triage and severity assessment: Within 3 business days
Regular updates on fix progress: Every 5 business days
Resolution timeline based on severity:
Critical: 7 days
High: 30 days
Medium: 60 days
Low: 90 days
Reward Structure
Rewards are based on severity and quality of report:
Critical
$5,000-$25,000
High
$2,500-$5,000
Medium
$500-$2,000
Low
$100-500
Severity Criteria
Critical:
Direct loss of user funds
Smart contract vulnerabilities leading to theft
Remote code execution
Access to private keys or sensitive credentials*
High:
Authentication bypass
Significant disclosure of private information
Injecting malicious transactions for users to sign
Stored cross-site scripting
Session hijacking
Medium:
Reflected cross-site scripting
Cross-site request forgery
Smart contract vulnerabilities affecting liveness
Low:
Missing security headers
Non-sensitive user data exposure
Race conditions without direct security impact
*Note that public environment variables such as RPC endpoints are not considered sensitive.
Public Disclosure
Please allow us 90 days before public disclosure
Coordinate disclosure timing with our security team
We encourage responsible disclosure through our bug bounty email address
Credit will be given to researchers who follow these guidelines
Safe Harbor
We will not pursue legal action against researchers who:
Follow this responsible disclosure policy
Make good faith efforts to avoid privacy violations, destruction of data, and interruption or degradation of our services
Do not exploit vulnerabilities beyond the minimum necessary to demonstrate the vulnerability
Contact
Primary Contact: security@tally.xyz
Updates to Policy
This policy may be updated from time to time. Please review it before starting any security research or submitting reports.
Last updated
Was this helpful?