Skip to content

Vulnerability Disclosure Policy โ€” Lantern โ€‹

Last Updated: January 4, 2026


Our Commitment โ€‹

Lantern is committed to the security and privacy of our users. We welcome security researchers and the community to help us identify and address potential vulnerabilities.

We believe in:

  • ๐Ÿ” Transparency about our security posture
  • ๐Ÿค Collaboration with the security research community
  • ๐Ÿ›ก๏ธ Continuous improvement of our defenses
  • ๐ŸŽฏ Responsible disclosure that protects users

Scope โ€‹

In Scope โ€‹

The following are within scope for security research:

โœ… Web application: https://ourlantern.app and https://dev.ourlantern.app
โœ… Authentication & authorization: Login, signup, session management
โœ… Encryption implementation: Client-side encryption vulnerabilities
โœ… API endpoints: Firestore security rules, Firebase Functions
โœ… Data handling: PII leakage, insecure storage, insufficient deletion
โœ… Client-side security: XSS, CSRF, clickjacking, etc.

Out of Scope โ€‹

โŒ Social engineering of Lantern staff or users
โŒ Physical security of offices or infrastructure
โŒ DDoS attacks or intentional service disruption
โŒ Third-party services (Firebase, Cloudflare) - report to them directly
โŒ Spam or content violations - use our abuse reporting system
โŒ Issues in dependencies - unless actively exploitable in Lantern


How to Report โ€‹

Preferred Method โ€‹

Email: security@ourlantern.app (coming soon - for now, use GitHub Issues for non-critical)

Please include:

  1. Description: Clear explanation of the vulnerability
  2. Impact: What could an attacker do? How severe?
  3. Steps to reproduce: Detailed reproduction steps
  4. Proof of concept: Code, screenshots, or video (if safe to share)
  5. Suggested fix: If you have ideas (optional but appreciated)
  6. Contact info: How we can reach you for updates

Encryption โ€‹

PGP public key available on request for sensitive disclosures.

GitHub Issues โ€‹

For non-sensitive security discussions:

  • Use label: security
  • Examples: Encryption best practices, architecture questions, general hardening

For critical vulnerabilities, please email directly (don't use public GitHub Issues).


What We Promise โ€‹

Response Timeline โ€‹

MilestoneTimelineDetails
Acknowledgment48 hoursWe confirm receipt of your report
Initial triage7 daysWe assess severity and impact
Status updatesEvery 7 daysRegular progress reports
Fix deployment30 days (critical)
90 days (non-critical)
Target timelines, may vary by complexity
Public disclosureCoordinatedAfter fix is deployed and users updated

Recognition โ€‹

We offer:

  • โœ… Credit in our security advisories (if you want)
  • โœ… Public thanks on our website/blog
  • โœ… Swag (Lantern stickers, shirts when available)
  • ๐Ÿ”„ Bounties (discretionary, when budget allows)

How we credit you:

  • Name (or handle) in advisory
  • Link to your website/Twitter (if provided)
  • Description of vulnerability found

If you prefer anonymity, just let us knowโ€”we respect that.

Transparency โ€‹

When a vulnerability is fixed, we will:

  1. Publish a security advisory with:
    • Description of vulnerability
    • Impact and severity
    • Affected versions
    • Credit to researcher
    • Remediation steps for users
  2. Notify affected users (if applicable)
  3. Update our security documentation

Safe Harbor โ€‹

Lantern commits to not pursuing legal action against security researchers who:

โœ… Follow responsible disclosure:

  • Report vulnerabilities privately
  • Give us reasonable time to fix (30-90 days)
  • Don't actively exploit vulnerabilities on production

โœ… Act in good faith:

  • Make a good faith effort to avoid privacy violations
  • Don't access more data than necessary to demonstrate the issue
  • Don't intentionally harm users or degrade service
  • Don't demand payment or rewards as a condition of disclosure

โœ… Stay within scope:

  • Test only on accounts you control
  • Don't exfiltrate user data
  • Don't test on production systems without permission

If you're unsure whether your testing would violate this policy, please ask first.


Security Research Guidelines โ€‹

Do's โœ… โ€‹

  • Do test on your own accounts
  • Do use our development environment (dev.ourlantern.app) when possible
  • Do document your findings thoroughly
  • Do suggest fixes or mitigations
  • Do ask questions if unsure about scope
  • Do report even if you're not sure it's exploitable

Don'ts โŒ โ€‹

  • Don't access or modify other users' data
  • Don't perform load testing or DDoS attacks
  • Don't use automated scanners without prior approval
  • Don't publicly disclose before we've patched
  • Don't leverage vulnerabilities for personal gain
  • Don't spam or harass our systems

Severity Guidelines โ€‹

We use CVSS v3.1 for severity scoring, but here's a simplified guide:

Critical (9.0-10.0) โ€‹

  • Remote code execution
  • Authentication bypass affecting all users
  • Encryption key exposure
  • Mass data breach

Response: Emergency patch within 24-48 hours

High (7.0-8.9) โ€‹

  • Authentication bypass affecting some users
  • SQL injection or NoSQL injection
  • Privilege escalation
  • Sensitive data exposure (PII)

Response: Patch within 7 days

Medium (4.0-6.9) โ€‹

  • CSRF on sensitive actions
  • Information disclosure (non-PII)
  • Authorization flaws
  • Insecure defaults

Response: Patch within 30 days

Low (0.1-3.9) โ€‹

  • Missing security headers
  • Cookie security issues
  • UI/UX security improvements
  • Rate limiting gaps

Response: Patch within 90 days


Bounty Program (Future) โ€‹

Current Status โ€‹

โณ Not yet active - We're a small team with limited budget.

When We'll Start โ€‹

We plan to launch a formal bug bounty program when:

  • We have raised funding or reached profitability
  • We've completed an external security audit
  • We have dedicated security engineering resources

What to Expect โ€‹

When active, bounties will likely be:

  • Critical: $500-$2,000
  • High: $200-$500
  • Medium: $50-$200
  • Low: Swag + recognition

For now: We offer recognition, credit, and our deep gratitude. ๐Ÿ™


Example Reports (Anonymized) โ€‹

Good Report โœ… โ€‹

Title: Stored XSS in Lantern Name Field

Description:
The Lantern Name field does not properly sanitize user input,
allowing an attacker to inject JavaScript that executes when
other users view the profile.

Impact:
An attacker could steal session tokens, perform actions on
behalf of victims, or redirect users to phishing sites.

Steps to Reproduce:
1. Create account
2. Set Lantern Name to: <script>alert(document.cookie)</script>
3. Have another user view your profile
4. JavaScript executes in victim's browser

Suggested Fix:
Sanitize all user input with DOMPurify before rendering.
Specifically, see UserProfile.jsx line 42.

Severity: High (CVSS 7.5)

Poor Report โŒ โ€‹

Title: Security vulnerability

Description:
Your site has a bug.

Steps:
Just look at the code.

Impact:
Bad.

Why it's poor: No details, no reproduction steps, no impact assessment.


FAQs โ€‹

Q: Can I test on production? โ€‹

A: Only on accounts you control. Don't access other users' data or disrupt service.

Q: What if I found something but I'm not sure it's a vulnerability? โ€‹

A: Report it anyway! We'd rather triage a non-issue than miss a real vulnerability.

Q: Can I automate testing? โ€‹

A: Ask first. Automated scanners can disrupt service. We may provide a test environment.

Q: Will you fix all reported issues? โ€‹

A: We'll fix all valid security issues. We may deprioritize low-severity issues or accept certain risks with documentation.

Q: Can I publish a blog post about my findings? โ€‹

A: Yes, after we've deployed a fix and coordinated disclosure timeline. We encourage public research!

Q: What if we disagree on severity? โ€‹

A: We'll discuss it transparently. We use CVSS scoring and industry standards, but we're open to debate.


Community Security Ethos โ€‹

We Believe In โ€‹

โœ… Security by design - Build it right from the start
โœ… Defense in depth - Multiple layers of protection
โœ… Least privilege - Minimal access, minimal data
โœ… Transparency - Open about our approach and limitations
โœ… Collaboration - Security is a team sport

We're Open To โ€‹

๐Ÿ’ก Architecture feedback - "Have you considered...?"
๐Ÿ’ก Best practice suggestions - "Industry standard is..."
๐Ÿ’ก Threat modeling - "What if an attacker...?"
๐Ÿ’ก Alternative approaches - "Signal does it this way..."

We're not perfect. We're a small team doing our best. If you see something that could be better, please tell us. We're listening.


Contact โ€‹

Primary: security@ourlantern.app (coming soon)
Backup: GitHub Issues (public, non-sensitive only)
PGP Key: Available on request

Response time: We aim for 48 hours, but we're a small team. If urgent, mark it as such.


Updates to This Policy โ€‹

We'll update this policy as we grow. Major changes will be:

  • Announced to researchers who've previously reported
  • Posted on our blog/website
  • Versioned in our GitHub repository

Last major update: January 4, 2026 - Initial comprehensive policy


Thank you for helping us keep Lantern secure! ๐Ÿ”’

Together, we can build something trustworthy.

Built with VitePress