-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k

Description
If you want to report a security concern to MetaMask in a way that allows them to investigate it responsibly, here's a template you can use. Remember, it's crucial to provide specific, actionable technical details for them to understand and address your concern.
Template for Reporting a Security Concern to MetaMask
Here's an example of what you could write. Remember to fill in the bracketed information with as much detail as possible. If you don't have technical details, you can still report a concern, but the more information you provide, the better.
Subject: Security Concern: Potential Vector for Malware/Trojan Infection Through [Specific Action or Scenario]
Issue Type: Potential Security Vulnerability / Malware Vector
Description:
I am reporting a security concern regarding a potential method by which a user's system could be compromised with malware or a trojan virus, potentially leading to the theft of cryptocurrency. My concern is specifically related to [clearly and concisely describe the action or scenario that you believe creates the vulnerability].
Specific Scenario/Steps to Reproduce (if applicable):
[Detail step-by-step what a user would do or what would happen to trigger this vulnerability. Be as precise as possible.]
[Example: "User navigates to a specific type of malicious website while MetaMask is active."]
[Example: "User clicks on a deceptive link that appears to be related to MetaMask updates."]
[Describe the observed outcome or your concern about what could happen.]
Impact (Potential):
I believe this could lead to:
Installation of unauthorized software (e.g., trojan, keylogger) on the user's system.
Unauthorized access to the user's MetaMask wallet.
Loss of cryptocurrency or NFTs.
Compromise of sensitive user data.
Evidence/Additional Information (if any):
[If you have screenshots, screen recordings, links to similar vulnerabilities, or any other technical details, describe them here. Do NOT include personal information or wallet seeds.]
[Example: "I observed unusual network activity after [action]."]
[Example: "This seems similar to phishing techniques seen with [mention a related technique, if known]."]
Proposed Mitigation (Optional):
[If you have any suggestions on how this could be prevented or improved, you can include them here. For example, "Perhaps a more prominent warning for users interacting with unsigned extensions."]