LLMSecForge: AI Model Security Bounty Program & Responsible Disclosure Framework
/frameworks/bounty-program/
This directory provides a comprehensive framework for establishing, managing, and scaling AI security bounty programs, with detailed guidance on responsible disclosure processes, vulnerability classification, and reward structures specifically tailored for LLMs and multi-modal AI systems.
frameworks/bounty-program/
βββ README.md
βββ program-design/
β βββ program-structure.md
β βββ scope-definition.md
β βββ vulnerability-taxonomy.md
β βββ rewards-framework.md
βββ implementation/
β βββ platform-selection.md
β βββ researcher-guidelines.md
β βββ triage-workflows.md
β βββ program-operations.md
βββ disclosure/
β βββ disclosure-policy.md
β βββ communication-templates.md
β βββ publication-guidelines.md
β βββ stakeholder-engagement.md
βββ assessment/
β βββ vulnerability-assessment.md
β βββ impact-classification.md
β βββ severity-determination.md
β βββ reward-calculation.md
βββ governance/
β βββ program-oversight.md
β βββ compliance-integration.md
β βββ metrics-reporting.md
β βββ continuous-improvement.md
βββ templates/
βββ bounty-program-policy.md
βββ disclosure-agreement.md
βββ vulnerability-report.md
βββ assessment-worksheet.md
README.md
AI Model Security Bounty Program & Responsible Disclosure Framework
This framework provides a comprehensive approach to establishing, managing, and scaling AI security bounty programs, with specific emphasis on LLMs and multi-modal AI systems. It includes detailed guidance on responsible disclosure processes, vulnerability classification taxonomies, and reward structures specifically calibrated for AI-specific security challenges.
Framework Purpose
This bounty program framework serves multiple critical functions:
- Program Establishment: Comprehensive guidance for creating effective AI security bounty programs
- Vulnerability Management: Structured approaches to vulnerability triage, assessment, and remediation
- Researcher Engagement: Strategies for attracting and retaining high-quality security researchers
- Responsible Disclosure: Transparent, ethical processes for handling vulnerability information
- Risk Reduction: Methods for translating security findings into meaningful risk reduction
Core Framework Components
1. Program Design & Structure
Foundational elements for bounty program creation:
- Program Structure: Organizational models, team composition, and operational frameworks
- Scope Definition: Methodologies for determining appropriate program scope and boundaries
- Vulnerability Taxonomy: AI-specific vulnerability classification system for bounty programs
- Rewards Framework: Structured approach to incentive design and reward determination
2. Implementation Guidance
Practical guidance for program implementation:
- Platform Selection: Criteria and considerations for bounty program platform selection
- Researcher Guidelines: Clear guidelines for participating security researchers
- Triage Workflows: Structured processes for vulnerability report handling
- Program Operations: Day-to-day operational procedures and best practices
3. Responsible Disclosure Framework
Comprehensive approach to ethical disclosure:
- Disclosure Policy: Policy framework for responsible vulnerability disclosure
- Communication Templates: Standardized communications for different disclosure scenarios
- Publication Guidelines: Standards for public disclosure of vulnerability information
- Stakeholder Engagement: Approaches for managing disclosure across stakeholders
4. Vulnerability Assessment
Methodologies for vulnerability evaluation:
- Vulnerability Assessment: Structured approach to validating and assessing reported issues
- Impact Classification: Framework for determining vulnerability impact
- Severity Determination: Methodologies for calculating vulnerability severity
- Reward Calculation: Structured approach to determining appropriate rewards
5. Program Governance
Oversight and management frameworks:
- Program Oversight: Governance structures for bounty program management
- Compliance Integration: Alignment with regulatory and compliance requirements
- Metrics & Reporting: Measurement and reporting frameworks
- Continuous Improvement: Methodologies for ongoing program enhancement
Applications of this Framework
This bounty program framework supports several critical security functions:
- Vulnerability Discovery: Structured approach to finding and addressing security issues
- Security Research Engagement: Framework for productive engagement with the security community
- Security Posture Improvement: Methods for translating findings into security enhancements
- Transparency Demonstration: Evidence of commitment to security transparency
- Regulatory Alignment: Support for compliance with emerging regulatory requirements
For Security Teams
If you're establishing or improving an AI security bounty program:
- Review the program structure to determine the appropriate model for your organization
- Utilize the implementation guidance for practical program establishment
- Leverage the templates for efficient program documentation
- Adopt the assessment methodologies for consistent vulnerability evaluation
For Security Researchers
If you're a security researcher interested in AI system vulnerabilities:
- Review the researcher guidelines to understand participation expectations
- Utilize the vulnerability taxonomy to effectively categorize findings
- Follow the disclosure policy for responsible vulnerability reporting
- Reference the severity and reward frameworks to understand evaluation criteria
Program Structure & Design
# AI Security Bounty Program Structure & Design
This document outlines the foundational elements for establishing an effective AI security bounty program, focusing on organizational structure, scope definition, and program design principles specifically tailored for LLMs and multi-modal AI systems.
## Program Models & Organizational Structure
### Program Models
Different organizational approaches to bounty program design:
| Program Model | Description | Best For |
|---------------|-------------|----------|
| Continuous Bounty Program | Ongoing program with stable scope and rewards | Mature AI products with established security practices |
| Time-Bounded Challenges | Focused testing events for specific periods | New features, major releases, or targeted testing needs |
| Invitation-Only Programs | Restricted programs for vetted researchers | Early-stage programs or highly sensitive systems |
| Public Programs | Open to all security researchers | Established products with robust triage capabilities |
| Hybrid Approaches | Combination of multiple models | Organizations with diverse AI offerings |
### Organizational Structure
Different team structures for managing bounty programs:
| Team Structure | Description | Advantages | Considerations |
|----------------|-------------|------------|----------------|
| Dedicated Bounty Team | Specialized team focused exclusively on bounty program | β’ Specialized expertise<br>β’ Consistent researcher experience<br>β’ Process optimization | β’ Resource intensive<br>β’ Potential isolation from dev teams<br>β’ May require specialized recruiting |
| Integrated Security Function | Bounty program managed within broader security team | β’ Resource efficiency<br>β’ Alignment with other security functions<br>β’ Knowledge sharing | β’ Competing priorities<br>β’ Potential skill gaps<br>β’ Process consistency challenges |
| Distributed Responsibility | Responsibilities distributed across security and product teams | β’ Direct product team engagement<br>β’ Efficient triaging<br>β’ Broader organizational ownership | β’ Coordination challenges<br>β’ Inconsistent researcher experience<br>β’ Knowledge fragmentation risks |
| Hybrid Model | Core team with distributed subject matter experts | β’ Balanced approach<br>β’ Specialized knowledge access<br>β’ Scalability | β’ Role clarity challenges<br>β’ Governance complexity<br>β’ Communication overhead |
### Key Program Roles
Essential roles for effective program operation:
| Role | Responsibilities | Skills Required |
|------|------------------|----------------|
| Program Manager | β’ Overall program oversight<br>β’ Researcher relations<br>β’ Program strategy | β’ Security program management<br>β’ Stakeholder management<br>β’ Strategic planning |
| Triage Specialist | β’ Initial report assessment<br>β’ Researcher communication<br>β’ Vulnerability validation | β’ Technical security expertise<br>β’ AI system knowledge<br>β’ Communication skills |
| Vulnerability Assessor | β’ Detailed vulnerability analysis<br>β’ Impact determination<br>β’ Remediation guidance | β’ Advanced security assessment<br>β’ AI vulnerability expertise<br>β’ Technical writing |
| Developer Liaison | β’ Engineering team coordination<br>β’ Remediation tracking<br>β’ Technical consultation | β’ Development background<br>β’ Cross-team collaboration<br>β’ Technical translation |
| Executive Sponsor | β’ Program advocacy<br>β’ Resource allocation<br>β’ Strategic alignment | β’ Leadership influence<br>β’ Security understanding<br>β’ Resource management |
## Scope Definition Framework
### Scope Definition Process
Systematic approach to defining appropriate program scope:
1. **Inventory Development**
- Catalog all AI models and systems
- Document associated infrastructure
- Identify integration points
- Map data flows
2. **Risk Assessment**
- Evaluate potential impact of vulnerabilities
- Assess architectural exposure
- Consider data sensitivity
- Analyze user base and usage patterns
3. **Capability Evaluation**
- Assess internal triage capacity
- Evaluate remediation capabilities
- Consider monitoring maturity
- Gauge developer response readiness
4. **Scope Formulation**
- Define included systems and boundaries
- Establish explicit exclusions
- Document testing constraints
- Specify acceptable testing methods
### Scope Elements for AI Systems
Key considerations for AI-specific scope definition:
| Scope Element | Considerations | Documentation Guidance |
|---------------|----------------|------------------------|
| Model Boundaries | β’ Which models and versions are in scope<br>β’ Testing limitations for specific models<br>β’ Performance impact constraints | Clearly document specific model versions, endpoints, and allowed testing volumes |
| Testing Methods | β’ Allowed adversarial techniques<br>β’ Rate limiting considerations<br>β’ Automated testing boundaries<br>β’ Multi-modal testing parameters | Detail specific allowed testing methods with clear boundaries for automation and scale |
| Data Considerations | β’ Test data parameters<br>β’ Personally identifiable information (PII) constraints<br>β’ Synthetic data requirements<br>β’ Output data handling | Establish clear guidelines for data usage in testing, with specific PII and sensitive data constraints |
| Infrastructure Elements | β’ API endpoints in scope<br>β’ Supporting services inclusion/exclusion<br>β’ Cloud infrastructure boundaries<br>β’ Developer tools and resources | Map specific infrastructure elements with network boundaries and clear demarcation of in-scope systems |
| Out-of-Scope Elements | β’ Explicitly excluded systems<br>β’ Prohibited testing techniques<br>β’ Third-party service exclusions<br>β’ Compliance-related exclusions | Provide detailed exclusions with rationale to prevent researcher confusion |
### Scope Documentation Framework
Standardized approach to scope documentation:
```yaml
program_scope:
# Models and systems in scope
in_scope_systems:
- name: "ProductName AI Assistant v2.1"
type: "Text-based LLM"
endpoints:
- "api.example.com/v1/completions"
- "api.example.com/v1/chat"
testing_constraints:
- "Max 100 requests per minute"
- "No PII in prompts"
- name: "ProductName Image Generator v1.5"
type: "Text-to-Image Model"
endpoints:
- "api.example.com/v1/images/generate"
testing_constraints:
- "Max 50 requests per hour"
- "No automated batch testing"
# Explicitly out of scope
out_of_scope:
systems:
- "Internal admin interfaces"
- "Billing systems"
- "Third-party authentication services"
techniques:
- "Denial of service testing"
- "Physical security testing"
- "Social engineering against employees"
impacts:
- "Performance degradation of production systems"
- "Testing affecting other users"
# Testing methods explicitly allowed
allowed_testing_methods:
- "Manual API interaction"
- "Prompt engineering techniques"
- "Custom script automation within rate limits"
- "Content policy boundary testing"
# Testing methods explicitly prohibited
prohibited_testing_methods:
- "Credential brute forcing"
- "Infrastructure vulnerability scanning"
- "Testing with illegal content"
- "Automated testing exceeding rate limits"
Vulnerability Taxonomy for Bounty Programs
AI-Specific Vulnerability Categories
Taxonomy of vulnerability categories specific to AI systems:
Category | Description | Example Vulnerabilities |
---|---|---|
Prompt Injection | Vulnerabilities allowing manipulation of model behavior through crafted inputs | β’ Instruction override β’ System prompt disclosure β’ Context manipulation |
Model Security Bypass | Vulnerabilities allowing circumvention of security controls | β’ Content policy evasion β’ Safety fine-tuning bypass β’ Filter circumvention |
Data Extraction | Vulnerabilities allowing unauthorized access to training data or model information | β’ Training data extraction β’ Parameter inference β’ Membership inference |
Model Functionality Abuse | Vulnerabilities allowing misuse of legitimate model capabilities | β’ Tool call manipulation β’ Function injection β’ Plugin/extension abuse |
Infrastructure Vulnerabilities | Vulnerabilities in supporting infrastructure | β’ API vulnerabilities β’ Service configuration issues β’ Dependency vulnerabilities |
Vulnerability Acceptance Criteria
Clear criteria for vulnerability inclusion in the program:
Criteria | Description | Assessment Guidance |
---|---|---|
Reproducibility | Vulnerability can be consistently reproduced | Require clear reproduction steps and validation across multiple attempts |
Realistic Exploitation | Vulnerability has realistic exploitation potential | Assess practical exploitability in real-world contexts |
Security Impact | Vulnerability has meaningful security impact | Evaluate against security objectives and potential harm |
Novel Finding | Vulnerability represents a new finding | Compare against known issues and previous reports |
In-Scope Target | Vulnerability affects in-scope systems | Verify affected systems against defined program scope |
Vulnerability Exclusions
Categories of findings typically excluded from bounty programs:
Exclusion Category | Rationale | Example |
---|---|---|
Theoretical Vulnerabilities | Lack practical exploitability | Pure speculative vulnerabilities without proof of concept |
Known Limitations | Represent known model constraints rather than vulnerabilities | Publicly documented model limitations |
Content Policy Disagreements | Represent policy perspectives rather than vulnerabilities | Disagreements with content filtering thresholds |
UI/UX Issues | Represent design choices rather than security vulnerabilities | Usability issues without security impact |
Third-Party Vulnerabilities | Beyond program control | Issues in dependent services not maintained by program owner |
Rewards Framework
Reward Structure Models
Different approaches to structuring bounty rewards:
Reward Model | Description | Advantages | Considerations |
---|---|---|---|
Fixed Reward Tiers | Predetermined reward amounts based on severity levels | β’ Clear expectations β’ Consistent awards β’ Simple administration |
β’ Less flexibility β’ May undervalue exceptional findings β’ Can become outdated |
Dynamic Assessment | Case-by-case determination based on multiple factors | β’ Precise valuation β’ Recognition of exceptional work β’ Adaptability |
β’ Less predictability β’ Higher administrative overhead β’ Potential for researcher disputes |
Impact-Based Rewards | Rewards tied directly to potential security impact | β’ Aligned with risk reduction β’ Focuses researcher effort β’ Clear value communication |
β’ Assessment complexity β’ Impact measurement challenges β’ Potential model complexity |
Hybrid Structures | Combination of tiers with adjustment factors | β’ Balances clarity with flexibility β’ Adaptable to unique findings β’ Maintains consistency |
β’ Requires clear documentation β’ More complex communication β’ Potential perception of arbitrariness |
Reward Determination Factors
Key factors influencing reward amounts:
Factor | Description | Assessment Approach |
---|---|---|
Vulnerability Severity | Overall severity rating | Use structured severity calculation methodologies (LLMVS) |
Exploitation Difficulty | Technical complexity of exploitation | Evaluate technical sophistication and exploitation prerequisites |
Impact Potential | Potential harm or security impact | Assess alignment with key risk scenarios and potential outcomes |
Report Quality | Clarity, completeness, and actionability | Evaluate reproduction steps, proof of concept, and remediation guidance |
Novel Discovery | Uniqueness and innovation | Compare against known techniques and previous reports |
Affected Scope | Range of affected systems | Determine breadth of impact across systems and users |
Sample Reward Structure for AI Vulnerabilities
Example reward structure specifically for AI system vulnerabilities:
Severity | Description | Reward Range | Example Vulnerabilities |
---|---|---|---|
Critical | Severe vulnerabilities with significant security impact | $10,000 - $50,000+ | β’ Unauthorized model training data access β’ Complete safety system bypass β’ Persistent system prompt override |
High | Significant vulnerabilities with substantial security implications | $5,000 - $10,000 | β’ Partial safety system evasion β’ Effective prompt injection with meaningful impact β’ Consistent PII extraction techniques |
Medium | Moderate vulnerabilities with limited security implications | $1,000 - $5,000 | β’ Limited content policy evasion β’ Temporary system instruction modification β’ Constrained unauthorized capability access |
Low | Minor vulnerabilities with minimal security impact | $250 - $1,000 | β’ Edge case content policy bypass β’ Limited information disclosure β’ Minor security control weaknesses |
Bonuses and Incentives
Additional rewards to incentivize high-value contributions:
Bonus Type | Description | Implementation Guidance |
---|---|---|
Exceptional Quality | Rewards for outstanding reports | Define clear criteria for exceptional quality with examples |
Novel Techniques | Bonuses for innovative attack methods | Document originality criteria and evaluation process |
Chaining Bonus | Rewards for combining multiple vulnerabilities | Establish requirements for effective vulnerability chains |
Critical System Bonus | Enhanced rewards for critical system findings | Clearly designate high-priority systems with enhanced rewards |
Remediation Insights | Bonuses for valuable fix recommendations | Define criteria for valuable remediation guidance |
Implementation Considerations
Key factors in effective program implementation:
1. Program Messaging and Positioning
Strategic considerations for program communication:
- Value Proposition: Clearly articulate researcher benefits beyond financial rewards
- Security Commitment: Frame program as demonstration of security investment
- Transparency Commitment: Establish clear expectations around disclosure and credit
- Community Engagement: Position program within broader security community
2. Researcher Experience Design
Creating a positive researcher experience:
- Clear Guidelines: Provide comprehensive but accessible program documentation
- Efficient Communication: Establish responsive communication channels and expectations
- Timely Assessment: Create efficient triage and assessment workflows
- Recognition Systems: Develop multiple forms of researcher recognition
3. Legal and Compliance Considerations
Important legal factors in program establishment:
- Safe Harbor Provisions: Clearly define legal protections for good-faith research
- Terms and Conditions: Establish comprehensive program terms with legal review
- Jurisdictional Considerations: Address international legal considerations
- Regulatory Alignment: Ensure program aligns with relevant regulatory requirements
4. Launch Strategy
Approaches to effective program launch:
- Phased Implementation: Consider graduated approach to program scale and scope
- Initial Researcher Pool: Determine initial access strategy (open vs. invited)
- Communications Plan: Develop comprehensive communications strategy
- Success Metrics: Establish clear program success measures
For detailed implementation guidance, templates, and practical examples, refer to the associated documentation in this bounty program framework section.
## Vulnerability Assessment & Impact Classification
```markdown
# Vulnerability Assessment & Impact Classification
This document provides a comprehensive methodology for assessing, classifying, and determining the severity of vulnerabilities reported through AI security bounty programs, with specific focus on issues unique to LLMs and multi-modal AI systems.
## Vulnerability Assessment Process
### Assessment Workflow
Systematic approach to vulnerability evaluation:
1. **Initial Triage**
- Verify report completeness
- Confirm in-scope systems
- Validate reproducibility
- Assign preliminary severity
2. **Technical Validation**
- Reproduce reported issue
- Confirm technical details
- Test exploitation constraints
- Document reproduction steps
3. **Impact Analysis**
- Determine security implications
- Assess potential harm scenarios
- Evaluate exploitation requirements
- Document attack scenarios
4. **Root Cause Analysis**
- Identify underlying causes
- Determine vulnerability class
- Assess broader implications
- Document technical findings
5. **Severity Determination**
- Apply severity framework
- Calculate severity score
- Determine reward tier
- Document severity rationale
### Assessment Team Composition
Recommended expertise for effective assessment:
| Role | Expertise | Assessment Responsibilities |
|------|-----------|----------------------------|
| AI Security Specialist | β’ LLM security<br>β’ Adversarial techniques<br>β’ AI vulnerability patterns | β’ Technical validation<br>β’ Attack scenario analysis<br>β’ AI-specific severity assessment |
| Model Engineer | β’ Model architecture<br>β’ Training methodology<br>β’ Model behavior analysis | β’ Root cause analysis<br>β’ Technical validation<br>β’ Remediation guidance |
| Security Engineer | β’ Application security<br>β’ Exploit development<br>β’ Security controls | β’ Exploitation validation<br>β’ Security impact assessment<br>β’ Control effectiveness analysis |
| Product/Legal Representative | β’ Product knowledge<br>β’ Legal/compliance expertise<br>β’ Risk management | β’ Business impact assessment<br>β’ Regulatory implications<br>β’ Public disclosure considerations |
### Assessment Tooling
Tools and resources for effective vulnerability assessment:
| Tool Category | Purpose | Example Tools |
|---------------|---------|---------------|
| Vulnerability Reproduction | Controlled environment for validation | β’ Isolated test environments<br>β’ API testing frameworks<br>β’ Model testing harnesses |
| Impact Analysis | Tools for understanding potential impact | β’ Attack simulation frameworks<br>β’ Threat modeling tools<br>β’ Impact assessment templates |
| Documentation | Structured documentation of findings | β’ Vulnerability documentation templates<br>β’ Evidence collection systems<br>β’ Assessment worksheets |
| Communication | Researcher and stakeholder communication | β’ Secure messaging platforms<br>β’ Vulnerability tracking systems<br>β’ Disclosure management tools |
## AI-Specific Vulnerability Impact Framework
### Impact Dimensions
Key dimensions for assessing AI vulnerability impact:
| Impact Dimension | Description | Assessment Considerations |
|------------------|-------------|---------------------------|
| Information Disclosure | Unauthorized access to sensitive information | β’ Type of information exposed<br>β’ Volume of potential disclosure<br>β’ Sensitivity of exposed data<br>β’ Persistence of access |
| System Integrity | Compromise of system intended behavior | β’ Degree of behavior manipulation<br>β’ Persistence of manipulation<br>β’ Detection difficulty<br>β’ Scope of affected functionality
### Impact Dimensions (continued)
| Impact Dimension | Description | Assessment Considerations |
|------------------|-------------|---------------------------|
| System Integrity | Compromise of system intended behavior | β’ Degree of behavior manipulation<br>β’ Persistence of manipulation<br>β’ Detection difficulty<br>β’ Scope of affected functionality |
| Authorization Bypass | Circumvention of access controls or permissions | β’ Level of unauthorized access gained<br>β’ Authorization boundary affected<br>β’ Authentication requirement evasion<br>β’ Privilege elevation potential |
| Safety Mechanism Evasion | Bypassing AI safety controls | β’ Type of content policy evaded<br>β’ Consistency of evasion<br>β’ Scope of safety bypass<br>β’ Potential harm from bypass |
| Resource Manipulation | Unauthorized use or manipulation of resources | β’ Computational resource impact<br>β’ Data resource manipulation<br>β’ Financial resource implications<br>β’ Service availability effects |
### Attack Scenario Development
Methodology for understanding potential exploitation:
| Scenario Element | Description | Assessment Approach |
|------------------|-------------|---------------------|
| Attacker Profile | Characterization of potential attackers | β’ Technical capability requirements<br>β’ Resource requirements<br>β’ Motivation factors<br>β’ Access prerequisites |
| Exploitation Path | Steps required for successful exploitation | β’ Exploitation complexity<br>β’ Prerequisite conditions<br>β’ Technical sophistication<br>β’ Detection avoidance requirements |
| Impact Scenario | Potential harm or impact from exploitation | β’ Direct consequences<br>β’ Secondary effects<br>β’ Scaling potential<br>β’ Persistence characteristics |
| Mitigation Difficulty | Complexity of addressing the vulnerability | β’ Fix complexity<br>β’ Deployment challenges<br>β’ Verification difficulties<br>β’ Side effect potential |
### AI-Specific Impact Categories
Specialized impact assessment for AI vulnerabilities:
| Category | Description | Example Scenarios |
|----------|-------------|-------------------|
| Model Behavior Manipulation | Causing a model to produce unintended outputs | β’ Safety alignment bypass allowing harmful content<br>β’ Context manipulation causing false information<br>β’ Persona manipulation resulting in inappropriate responses |
| Training Data Extraction | Extracting data used to train the model | β’ Verbatim training data retrieval<br>β’ Inference of confidential training examples<br>β’ Reconstruction of protected information |
| Model Knowledge Inference | Inferring model capabilities or configuration | β’ System prompt extraction<br>β’ Model parameter inference<br>β’ Capability boundary mapping |
| Abuse Amplification | Amplifying potential for abuse or misuse | β’ Automating harmful content generation<br>β’ Scaling content policy evasion<br>β’ Enhancing manipulation effectiveness |
| Deployment Context Exploitation | Exploiting the environment where model is deployed | β’ Context window poisoning<br>β’ Integration point manipulation<br>β’ Environment variable exploitation |
## Severity Classification Framework
### LLMVS: Language Model Vulnerability Scoring
Specialized scoring system for LLM vulnerabilities:
| Component | Weight | Description | Assessment Criteria |
|-----------|--------|-------------|---------------------|
| Exploitation Ease | 20% | How easily the vulnerability can be exploited | β’ Technical complexity<br>β’ Required resources<br>β’ Reproducibility<br>β’ Prerequisites |
| Impact Severity | 35% | Potential negative impact from exploitation | β’ Harm potential<br>β’ Scope of impact<br>β’ Affected users<br>β’ Persistence |
| Detection Resistance | 15% | Difficulty of detecting exploitation | β’ Monitoring evasion<br>β’ Behavioral indicators<br>β’ Signature development<br>β’ Detection complexity |
| Model Applicability | 15% | Breadth of affected models or systems | β’ Model type coverage<br>β’ Version applicability<br>β’ Architecture sensitivity<br>β’ Implementation specificity |
| Remediation Complexity | 15% | Difficulty of addressing the vulnerability | β’ Fix complexity<br>β’ Implementation challenges<br>β’ Verification difficulty<br>β’ Potential side effects |
### Severity Calculation
Structured approach to calculating vulnerability severity:
```python
# Pseudocode for LLMVS severity calculation
def calculate_severity(assessment):
# Component scores (0-10 scale)
exploitation_ease = assess_exploitation_ease(assessment)
impact_severity = assess_impact_severity(assessment)
detection_resistance = assess_detection_resistance(assessment)
model_applicability = assess_model_applicability(assessment)
remediation_complexity = assess_remediation_complexity(assessment)
# Weighted score calculation
severity_score = (
(exploitation_ease * 0.20) +
(impact_severity * 0.35) +
(detection_resistance * 0.15) +
(model_applicability * 0.15) +
(remediation_complexity * 0.15)
) * 10 # Scale to 0-100
# Severity category determination
if severity_score >= 80:
severity_category = "Critical"
elif severity_score >= 60:
severity_category = "High"
elif severity_score >= 40:
severity_category = "Medium"
else:
severity_category = "Low"
return {
"score": severity_score,
"category": severity_category,
"components": {
"exploitation_ease": exploitation_ease,
"impact_severity": impact_severity,
"detection_resistance": detection_resistance,
"model_applicability": model_applicability,
"remediation_complexity": remediation_complexity
}
}
Severity Level Descriptions
Detailed description of severity categories:
Severity | Score Range | Description | Response Expectations |
---|---|---|---|
Critical | 80-100 | Severe vulnerabilities with broad impact potential and significant harm | β’ Immediate triage β’ Rapid remediation plan β’ Executive notification β’ Comprehensive mitigation |
High | 60-79 | Significant vulnerabilities with substantial security implications | β’ Priority triage β’ Rapid assessment β’ Prioritized remediation β’ Interim mitigations |
Medium | 40-59 | Moderate vulnerabilities with limited security implications | β’ Standard triage β’ Scheduled assessment β’ Planned remediation β’ Standard mitigations |
Low | 0-39 | Minor vulnerabilities with minimal security impact | β’ Batch triage β’ Prioritized assessment β’ Backlog remediation β’ Documentation updates |
Reward Determination Process
Reward Calculation Framework
Structured approach to determining appropriate rewards:
Factor | Weight | Description | Assessment Criteria |
---|---|---|---|
Base Severity | 60% | Foundational reward based on severity | β’ LLMVS score and category β’ Standardized severity tiers β’ Base reward mapping |
Report Quality | 15% | Quality and clarity of vulnerability report | β’ Reproduction clarity β’ Documentation thoroughness β’ Evidence quality β’ Remediation guidance |
Technical Sophistication | 15% | Technical complexity and innovation | β’ Novel technique development β’ Research depth β’ Technical creativity β’ Implementation sophistication |
Program Alignment | 10% | Alignment with program priorities | β’ Priority area targeting β’ Program objective advancement β’ Strategic vulnerability focus β’ Key risk area impact |
Quality Multiplier Framework
Adjustments based on report quality and researcher contribution:
Quality Level | Multiplier | Criteria | Example |
---|---|---|---|
Exceptional | 1.5x | β’ Outstanding documentation β’ Novel research β’ Comprehensive analysis β’ Valuable remediation guidance |
Detailed report with novel technique discovery, proof-of-concept code, impact analysis, and specific fix recommendations |
Excellent | 1.25x | β’ Above-average documentation β’ Strong analysis β’ Good remediation insight β’ Thorough testing |
Well-documented report with clear reproduction steps, multiple test cases, and thoughtful mitigation suggestions |
Standard | 1.0x | β’ Adequate documentation β’ Clear reproduction β’ Basic analysis β’ Functional report |
Basic report with sufficient information to reproduce and understand the vulnerability |
Below Standard | 0.75x | β’ Minimal documentation β’ Limited analysis β’ Poor clarity β’ Incomplete information |
Report requiring significant back-and-forth to understand, with unclear reproduction steps or limited evidence |
Reward Calculation Process
Step-by-step process for determining bounty rewards:
Determine Base Reward
- Calculate LLMVS score
- Map severity category to base reward range
- Establish initial position within range based on score
Apply Quality Adjustments
- Assess report quality
- Evaluate technical sophistication
- Determine program alignment
- Calculate composite quality score
Calculate Final Reward
- Apply quality multiplier to base reward
- Consider special circumstances or bonuses
- Finalize reward amount
- Document calculation rationale
Review and Approval
- Conduct peer review of calculation
- Obtain appropriate approval based on amount
- Document final determination
- Prepare researcher communication