BUG-BOUNTY.md: we stop the bug-bounty end of Jan 2026

Remove mentions of the bounty and hackerone.

Closes #20312
This commit is contained in:
Daniel Stenberg 2026-01-22 09:41:47 +01:00
parent 2da1bbca96
commit ca7ef4b817
No known key found for this signature in database
GPG key ID: 5CC908FDB71E12C2
11 changed files with 36 additions and 133 deletions

View file

@ -29,9 +29,11 @@ mailing lists. Messages associated with any commits should not make any
reference to the security nature of the commit if done prior to the public
announcement.
- The person discovering the issue, the reporter, reports the vulnerability on
[HackerOne](https://hackerone.com/curl). Issues filed there reach a handful
of selected and trusted people.
- The person discovering the issue, the reporter, reports the vulnerability to
the curl project. Do this [on
GitHub](https://github.com/curl/curl/security/advisories) or send an email
to `security at curl.se`. Such submissions reach a handful of selected and
trusted people.
- Messages that do not relate to the reporting or managing of an undisclosed
security vulnerability in curl or libcurl are ignored and no further action
@ -76,10 +78,6 @@ announcement.
repository via a normal PR - but without mentioning it being a security
vulnerability.
- The monetary reward part of the bug-bounty is managed by the Internet Bug
Bounty team and the reporter is asked to request the reward from them after
the issue has been completely handled and published by curl.
- No more than seven days before release, inform
[distros@openwall](https://oss-security.openwall.org/wiki/mailing-lists/distros)
to prepare them about the upcoming public security vulnerability
@ -144,11 +142,6 @@ has been published.
*All* reports submitted to the project, valid or not, should be disclosed and
made public.
## Bug Bounty
See [BUG-BOUNTY](https://curl.se/docs/bugbounty.html) for details on the
bug bounty program.
# Severity levels
The curl project's security team rates security problems using four severity