Add a security policy
See original GitHub issueHey there!
I belong to an open source security research community, and a member (@ready-research) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly add a SECURITY.md
file with an email, or another contact method? GitHub recommends this best practice to ensure security issues are responsibly disclosed, and it would serve as a simple instruction for security researchers in the future.
Thank you for your consideration, and I look forward to hearing from you!
(cc @huntr-helper)
Issue Analytics
- State:
- Created 2 years ago
- Reactions:1
- Comments:6 (3 by maintainers)
Top Results From Across the Web
10 steps to a successful security policy | Computerworld
10 steps to a successful security policy · 1. Identify your risks · 2. Learn from others · 3. Make sure the policy...
Read more >Adding a security policy to your repository - GitHub Docs
On GitHub.com, navigate to the main page of the repository. · Under the repository name, click Security. · In the left sidebar, click...
Read more >Configure security policy settings (Windows 10) | Microsoft Learn
In the console tree, click Computer Configuration, click Windows Settings, and then click Security Settings. Do one of the following: Click ...
Read more >How to develop an effective information security policy
3. Include all appropriate elements · Acceptable Use Policy (AUP): This policy governs how employees can use a website, network, or internet service....
Read more >How to create a security policy and set rules - Snyk User Docs
To create a new security policy, click Add a new policy in the security policy menu. ; Security policy rules follow an “if,...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@Cervator - thank you for updating the status of the report.
Thanks for your recommendations for the website, we will definitely take your ideas on board. If you have any things you would really love to see on the platform, I’d love to invite you to create a feature request on our public repository.
With regards to bounties, we reward maintainers as we understand that taking time from a maintainer is precious, where they could be contributing elsewhere, and we see the fixing of vulnerabilities as an important part of remediating a vulnerability.
Long term, we look to work closely with enterprises that depend so heavily on OSS to fund the security/vulnerability research. We are constantly on the watch for “abuse” behaviors, and without a doubt, they evolve as the platform grows. We have and continue to put various quality measures in place to prevent these abuses.
Let me know if you have any further questions - happy to discuss! ❤️
Hello @Cervator - thanks for sharing your feedback!
To give some clarity, approve signals to us that you believe the report to be a legitimate security concern against the code-base, that has potential security implications or impact. When rejecting, this indicates that it is not a security issue (i.e. a bug or some technical issue - which is what sounds like this case could be).
We are constantly trying to improve the platform to ensure that quality reports are shared with maintainers, to save time for both the maintainer and researcher!
In my opinion, given your feedback here and on the report, I would recommend “Rejecting” the report as it does not appear to be a security concern with impact in your eyes.
Let me know if you have any more questions or feedback, and happy to help! ❤️