{% extends "global/layout.html" %} {% block title %}{{ _('Vulnerability Response Process') }}{% endblock %} {% block lastupdated %}2023-04{% endblock %} {% block content_id %}vrp{% endblock %} {% block content %}
{% trans %} This process is subject to change. Please refer to this page for the current VRP. {%- endtrans %}
{% trans %}Researchers: during your study and network testing, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the I2P network - Performing social engineering on I2P team and community members - Performing any physical or electronic attempts against I2P property and/or data centers{%- endtrans %}
{% trans %}As I2P is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of I2P is.{%- endtrans %}
{% trans -%} Echelon is the trusted security point-of-contact. He forwards emails to team members as appropriate. {%- endtrans %}
{% trans -%} Any further questions or resolutions regarding the incident(s) between the researcher and response + development team after public disclosure can be addressed via the following: {%- endtrans %}