Protect smart contract source code, audit findings, and security methodologies while establishing responsible disclosure frameworks for vulnerability handling.
24-48 hour remediation window. If unaddressed, coordinated disclosure to protect users. Pause mechanism activation if available.
7-14 day remediation window. Private disclosure to core team with fix verification. Public disclosure after patch deployment.
30 day remediation window. Standard audit report timeline. May be included in public report after addressed.
90 day remediation window. Can be disclosed in public audit report. Tracked for future improvement.
Common smart contract scenarios requiring specialized protection
Engaging third-party auditors to review smart contract code before deployment. Protects both source code and audit findings.
Sharing contract architecture with development partners, code reviewers, or potential acquirers during due diligence.
Sharing interface specifications, ABI details, or integration code with partners building on your protocol.
Establishing confidentiality terms for bug bounty participants who discover and report vulnerabilities.
| Issue | Risk Level | Recommended Action |
|---|---|---|
| No exploit prohibition clause | High | Add explicit prohibition on exploiting discovered vulnerabilities for profit |
| Overly broad confidentiality blocking security disclosure | High | Include responsible disclosure rights for unaddressed critical vulnerabilities |
| No distinction between source and bytecode | Medium | Clarify that on-chain bytecode is public while source remains confidential |
| Auditor methodology not protected | Medium | Include mutual confidentiality covering auditor tools and techniques |
| No severity-based disclosure timeline | Low | Define different treatment for critical vs. informational findings |
Smart contract vulnerabilities can result in significant user fund losses. While confidentiality is important during remediation, NDAs should never prevent disclosure of actively exploited or imminent threats to user funds. Consider including carve-outs for emergency security disclosures and coordination with CERT/CC or similar disclosure coordinators for critical issues.