Howdy, folks - this is an idea that was inspired by a recent discussion and CVE in a Fediverse project. The core of it came down to: could contributors get paid for closing vulnerabilities to make the fediverse safer?
We think Nivenly can help! The idea is that Nivenly will pay a modest “sponsorship” for people who close high and critical CVEs. Since this is the first time we’ve tried something like this, we want to start small and are calling this an “experiment”. Our hypothesis is: by sponsoring the work to close important vulnerabilities, we will give contributors more opportunity to make open source contributions, therefore making the overall fedi ecosystem safer.
The full text of the proposal is below. We’d love your questions, feedback, and ideas. Since this is an experiment, the idea is to try something out, get some data, reach a conclusion, and do it again!
Happy Hachyderming,
Esk
Changelog
- 2024-02-14 - @esk
- Adjusted to include finding vulnerabilities in addition to fixing them.
- Clarified we are looking at the base CVSS score of the vuln.
- Simplified payouts to $200 for finding/fixing a high/crit.
- Increased the fund limit to account for round numbers & more activity since we’re now including finding vulns.
Nivenly Fedi Security Fund
Background
Software inevitably has security vulnerabilities, and software for the Fedi is no exception. Closing these vulnerabilities provides a safer, more trustworthy experience for citizens of the Fediverse. To that end, Nivenly is launching an experimental fund to sponsor contributors who find or close serious security flaws in popular open source Fediverse products.
The Fund
Individual contributors who identify or fix a high or critical CVSS base score vulnerability in Fediverse software will receive a one-time sponsorship of $200 from the Nivenly Foundation.
Since this is a new program and we want to gather data about how contributors will engage with it, Nivenly will set aside $3,000 USD through the end of June 30, 2024. Before or at the conclusion of the experiment, Nivenly will hold a member vote to determine if we want to continue the program.
Terms
Since this is a time and funds limited experiment, and it’s the first time Nivenly has tried something like this, there are a few terms to keep things a bit simpler:
- Sponsorships will only be awarded to individuals, not teams or corporations.
- Contributor is responsible for providing Nivenly with
- (preferred) a Github Security Advisory that is:
- Linked to an eligible software project.
- Linked to the contributor’s Github account with credit for the find or fix.
- Sponsorship credit requested from the @nivenly-foundation Github account.
- or, if the project does not use Github:
- Link to a vulnerability in an authoritative database like NIST’s NVD
- Link to a PR that contains the fix and references the above CVE
- Demonstrate ownership of accounts in both the project’s source control system and Github (e.g. create a gist/snippet and share it with Nivenly)
- (preferred) a Github Security Advisory that is:
- Contributor is responsible for notifying Nivenly when the CVE is identified or fix is merged; payment will be issued no later than 14 days after.
- Sponsorship will be submitted via a one-time Github Sponsors payment. Nivenly will be responsible for any fees associated with the sponsorship.
- Contributor may receive sponsorships from other organizations for the same CVE.
- During the experiment, a single contributor is limited to a maximum payout of $1000 USD.
Eligible Fediverse Software
Don’t see the project you were expecting? Raise a ticket at nivenly/community and let’s have a discussion about adding it.