Incident response process
When a security incident (bug, exploit, misbehavior) occurs, Buburuza follows a structured process:
Detection
Automatic alerts / monitoring (e.g. for unusual transaction patterns, sequencer behavior).
Reports from users, auditors, or bug bounty submissions.
Triage & Assessment
Classify severity (impact on funds, availability, data integrity).
Gather technical details, logs, state snapshots.
Containment
If possible: pause affected components (e.g. disable certain functions, stop propagation).
Deploy hotfix or revert to safe mode if smart contracts allow it (upgradeable proxies, etc.).
Communication
Public notification of incident (transparency).
Internal coordination among engineers, validators, and governance.
Regular status updates to community.
Remediation / Patch
Fix bug, test, audit.
Deploy patch via governance / upgrade process if required.
Post-Incident Analysis
Root cause analysis.
Publish report (what happened, how fixed, lessons learned).
Review whether existing mitigation/monitoring was sufficient; possibly update security design.
Prevention
Use lessons to improve audits, code reviews, security practices.
Update documentation, best practices, possibly improve bounty incentives.
Last updated
