Responsible Disclosure Policy
PRC Wallet is a non-custodial wallet. We take security seriously and welcome good-faith reports from researchers. This page explains how to report, what's in scope, and the legal safe-harbor we provide to protect responsible research.
90-day coordinated disclosure by default; accelerated timelines possible for active exploitation.
Quick Reference (TL;DR)
- • Email
[email protected](use PGP) - • Acknowledge 24h, triage 72h, updates weekly
- • 90-day coordinated disclosure
- • Scope: wallet.prc.network, api.prc.network, prc.network, official apps/bots
- • No DoS, no user-data access, no funds movement
- • Recognition now, bounties planned
Contact & Encryption
Primary security contact:
[email protected]PGP public key (for encrypted reports):
Fingerprint: F3A1 9B7C 2D8E 4C5A 7F01 9AA2 1C3D 4E5F 6071 8AB9
Key ID: 0x60718AB9
Key block:
-----BEGIN PGP PUBLIC KEY BLOCK----- [PASTE YOUR PUBLIC KEY HERE] -----END PGP PUBLIC KEY BLOCK-----
security.txt:
We publish our security contact and policy at https://prc.network/.well-known/security.txt
Service levels (SLAs):
Legal Entity & Safe Harbor
Legal entity: PRC Network, LLC
Jurisdiction of incorporation: United States, Delaware
Safe Harbor (good-faith research):
If you comply with this policy, PRC commits not to initiate civil or criminal action, and not to pursue DMCA/anti-circumvention claims, CFAA-type claims, or similar, against you. We consider research under this policy to be authorized and in good faith.
This safe harbor applies to:
- • Unauthorized access that is strictly necessary to prove a vulnerability
- • Non-destructive testing
- • Research avoiding privacy violations and service disruption
Conditions:
- • Stop testing and notify us immediately upon finding user-data access paths, key-material exposure, or a path to unauthorized transactions
- • Do not access, modify, or exfiltrate data beyond the minimum needed to demonstrate impact
- • No extortion or threats. Bounties/thanks are independent of disclosure
Note: This policy does not bind third parties (cloud/infra providers, partners). We will help coordinate where possible.
Scope
In-scope assets (production):
- •
wallet.prc.network— Web wallet UI and client-side logic - •
api.prc.network— Public APIs and backend services owned by PRC - •
prc.network— Main site, downloads, and security pages - • /download — hashes & PGP
- • Mobile apps (iOS/Android) — when publicly released by PRC
- • Official GitHub repos — code maintained by PRC (public)
- • Telegram companion/bot — official PRC bot (no keys stored)
Strongly encouraged test targets:
- • Testnets for EVM/Vite where possible (use faucets)
- • Non-production environments we explicitly share with you
Out of scope:
- • Third-party services and vendors unless PRC-controlled misconfiguration is root cause
- • Social engineering (phishing emails/DMs to users, PRC staff, vendors)
- • Physical security of PRC offices, data centers, or staff devices
- • Denial of Service (DoS/DDoS, volumetric traffic, resource exhaustion)
- • Spam or automated account creation at scale
- • Low-risk issues without meaningful security impact
- • Rate-limit/CSRF on non-state-changing endpoints
- • Missing SPF/DMARC on non-sending domains
Rules of Engagement
Critical Rules:
No harm:
Do not impact availability or integrity of services.
No funds at risk:
Never move or attempt to move real user funds. Use testnets; if mainnet is unavoidable, use dust-value only and your own accounts.
Minimal data handling:
If you encounter user data, stop, minimize access, and report immediately. Do not store, transmit, or share data.
Privacy:
No scraping or mass enumeration of user data.
Severity & Prioritization
We use CVSS v3.1 as guidance plus product context (keys, transactions, privacy):
Remote code execution; signature forgery; unauthorized transaction/bypass of signing; extraction of private keys/seed/passphrase; auth bypass leading to key operations; supply-chain compromise of download/updates.
Privilege escalation; SSRF to sensitive internal services; stored XSS enabling transaction tampering; CSRF leading to unauthorized signing; sensitive info disclosure.
Stored/DOM XSS requiring user action but enabling account impact; open redirect with realistic exploit chain; weaknesses in crypto usage without practical exploit.
Clickjacking on non-sensitive pages; missing security headers; minor info leaks without impact.
Rewards
Current Status:
Launch phase: Recognition-only (Hall of Fame + thank-you + optional swag)
Planned bounty program: Monetary rewards to be announced after initial audits
Target ranges (subject to change):
Rewards are based on impact, quality of report, and uniqueness (first valid report gets it).
How to Report
Please email [email protected] (PGP-encrypted preferred).
Use the subject: [VULN] <short title> — <asset>
Include (required):
- • Summary: One-paragraph impact description
- • Asset & version: e.g., wallet.prc.network (web build commit), api.prc.network (version), app version/OS
- • Severity (your estimate): CVSS vector if possible
- • Reproduction steps: Numbered, from a fresh install/account
- • Proof of concept: Code, payloads, screenshots, or a short video
- • Scope of impact: What an attacker can achieve; preconditions
- • Mitigation ideas: Optional but helpful
- • Researcher details: Name/alias, contact, Hall of Fame preference, payout wallet (for future bounties)
Please avoid sending: real user data, private keys, or seeds. Redact sensitive info.
Prohibited Activities
- • DoS/DDoS or traffic floods
- • Data destruction or tampering
- • Accessing others' accounts or funds
- • Extortion or threats
- • Public disclosure prior to coordination timeline without our consent
Hall of Fame
We maintain a Security Hall of Fame recognizing researchers who help secure PRC. Entries include name/alias, link (optional), severity, and advisory link.
URL: /security/hall-of-fameAudits & Testing History
We publish third-party security assessments and pen-test summaries at /security/audits with dates, scope, and resolved findings.
Current status: [To be published / In progress with <Firm Name> / Completed on <Date>]
Media Inquiries
[email protected]Changes to This Policy
We may update this policy. Material changes will be dated and versioned here. Continued research after changes constitutes acceptance of the updated terms.