Reporting Vulnerabilities
Relix takes security seriously. No matter how careful the design and implementation, a live network will always benefit from extra eyes reviewing its code, infrastructure, and configuration. If you discover a weakness in any Relix component, we want to hear about it quickly, privately, and with enough detail to fix it safely.
This page explains how to report vulnerabilities, what information is helpful, and what you can expect from the Relix team in return.
1. What is in scope?
In general, the following areas are considered in scope for vulnerability reports:
Core protocol and node software
Consensus implementation
Networking and P2P layers
Execution engine and EVM integration
Official Relix infrastructure
Public RPC endpoints operated by the Relix team
Official testnet infrastructure where clearly indicated
First-party smart contracts and dApps
Contracts and frontends developed or maintained by the Relix core team
Staking, governance, bridge, or system contracts explicitly branded as part of Relix
Documentation and configuration examples
Official guides that, if followed exactly, would lead to an insecure setup
Sample configs that expose users to unnecessary risk
Issues affecting third-party projects built on Relix (independent dApps, exchanges, or tools) should be reported directly to those teams. If you are unsure who owns a component, you can still contact us; we will try to route the information appropriately.
2. What is out of scope?
The following are usually not treated as security vulnerabilities:
Typos, minor layout issues, or purely cosmetic problems
General product feedback or UX complaints
Attacks that require full compromise of a user’s own device or wallet
Automated scanner output without proof of impact
Theoretical weaknesses that cannot be demonstrated in a realistic scenario
That said, if you are unsure whether something matters, it is better to report it. We prefer a cautious report that turns out to be benign over a serious issue left unreported.
3. How to report a vulnerability
To keep users and validators safe, please do not disclose vulnerabilities publicly before the Relix team has had a chance to assess and address them.
You can report privately using one of the official channels:
Email: a dedicated security contact address (to be published in the main docs / website footer)
GitHub: security advisories or private issues in relevant
relixchainrepositoriesDirect contact: via the official Telegram or other agreed private channel, if you already work with the team
When you reach out, clearly label the message as a security issue or vulnerability report so it is triaged quickly.
4. Information that helps us investigate
A concise, well-structured report speeds up triage and fix deployment. Where possible, include:
Summary
One or two sentences describing the issue and potential impact
Impact
What could an attacker achieve?
Which users, validators, or systems are affected?
Technical details
Exact component: repository, contract address, endpoint, or service
Relevant code snippets, commit hashes, or configuration fragments
Preconditions required for the attack to work
Steps to reproduce
A minimal, clear set of steps or a script that reproduces the issue
Any test accounts or addresses you used during testing
Environment
Network (Relix Testnet, internal dev environment, etc.)
Node/client version, OS, and tool versions where applicable
If you have ideas about how to fix the issue, feel free to include them, but they are not required. A clean reproduction is always more valuable than a speculative patch.
5. Responsible testing guidelines
We strongly encourage security research, but it must be done in a way that does not put users or the network at risk. In particular:
Do not exploit beyond what is needed to demonstrate impact
Avoid stealing funds, disrupting service, or modifying real user data.
Use test accounts and minimal amounts wherever possible.
Do not perform denial-of-service attacks on public infrastructure
Large-scale traffic floods or resource exhaustion tests should only be done with explicit prior approval.
Do not access or attempt to access private data
If you accidentally encounter sensitive information (keys, credentials, logs), stop and include that fact in your report.
Respect legal boundaries
Your testing should comply with local laws and any terms of service that apply.
If in doubt about whether a particular test is appropriate, ask first. A short message to the security contact can prevent accidental harm.
6. Our commitment to reporters
When you report a vulnerability privately and in good faith, you can expect the Relix team to:
Acknowledge receipt
Confirm that we have seen your report and are investigating.
Triage the issue
Assess severity and potential impact.
Determine whether immediate mitigation is needed.
Communicate appropriately
Keep you informed about the status of the issue when possible.
Coordinate on timing of any public disclosure so users and operators have time to patch.
Recognize your contribution
With your consent, credit you in release notes or a security acknowledgements page when the fix is deployed.
Where a formal bug bounty or rewards program exists, evaluate eligibility under those rules.
We do not pursue legal action against researchers who follow responsible disclosure practices and avoid harming users or the network.
7. Future bug bounty and incentives
As Relix moves closer to mainnet and the protocol surface stabilizes, a formal bug bounty program may be introduced to:
Provide structured rewards for high-impact findings
Encourage targeted review of critical components (consensus, staking, bridges, etc.)
Offer clear rules for scope, reward tiers, and eligibility
Details of any such program will be published through:
The official website:
https://relixchain.comThe Relix GitHub organization:
https://github.com/relixchainOfficial social channels (X, Telegram, and others)
Until then, we still value and welcome responsible security research, even in the absence of a formal bounty.
8. Summary
If you see something that might compromise Relix, tell us privately, clearly, and with enough detail to act on it. In return, we will treat your report seriously, work to fix the underlying issue, and recognize your role in helping keep the network safe.
Security is not a one-time audit; it is an ongoing collaboration between protocol developers, infrastructure operators, dApp teams, and independent researchers. Your reports are a critical part of that collaboration.
Last updated