Skip to content

Commit 1f3bf81

Browse files
Repo File Sync: synced file(s) with Contrast-Security-OSS/common-artifacts
Change-type: patch
1 parent c637108 commit 1f3bf81

1 file changed

Lines changed: 54 additions & 0 deletions

File tree

security.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
# Security Policy
2+
3+
Contrast Security is committed to the security of our users and our open-source software. We appreciate the efforts of security researchers who help us keep our products safe.
4+
5+
## Supported Versions
6+
7+
We actively support and provide security updates for the following versions of our projects. If you are using a version not listed below, please upgrade to a supported version.
8+
9+
| Version | Supported |
10+
| ------- | ------------------ |
11+
| < 1.0.0 | ✅ Supported |
12+
| 0.x.x | ❌ Not Supported |
13+
14+
## Reporting a Vulnerability
15+
16+
**Please do not report security vulnerabilities through public GitHub issues.**
17+
18+
We offer two ways to report a vulnerability:
19+
20+
### 1. Private Vulnerability Reporting (Preferred)
21+
The easiest way to report a vulnerability is via GitHub's [Private Vulnerability Reporting](https://docs.github.com/en/code-security/how-tos/report-and-fix-vulnerabilities/privately-reporting-a-security-vulnerability) feature. Navigate to the **"Security"** tab of the specific repository and click **"Report a vulnerability"**.
22+
23+
### 2. Email
24+
Alternatively, you can email your report to [security@contrastsecurity.com](mailto:security@contrastsecurity.com).
25+
26+
For more details on our processes, please see our official [Vulnerability Disclosure Policy](https://www.contrastsecurity.com/disclosure-policy).
27+
28+
### What to include in your report:
29+
* A description of the vulnerability and its potential impact.
30+
* A clear, step-by-step guide to reproducing the issue (PoC scripts or screenshots are helpful).
31+
* The version of the software affected.
32+
33+
## Our Response Process
34+
35+
Contrast takes every report seriously. After you submit a report:
36+
37+
* **Acknowledgment:** We will acknowledge receipt of your report within 2 business days.
38+
* **Investigation:** Our security team will investigate the report and may reach out for more information.
39+
* **Updates:** We will keep you informed of our progress as we work toward a fix.
40+
* **Disclosure:** We follow coordinated disclosure. We ask that you do not share the vulnerability publicly until we have released a fix and an official announcement.
41+
42+
## Policy on Dependency Updates
43+
44+
To ensure the stability of our ecosystem, we follow a **7-day "soak" period** for most dependency updates. This allows the community to identify any "left-of-vulnerability" issues or regressions in new upstream releases before we integrate them.
45+
46+
If you have specific concerns regarding a high-severity CVE in one of our dependencies, please contact us at the email above.
47+
48+
## Third-Party Modules
49+
50+
Reports regarding security bugs in third-party modules should be directed to the person or team maintaining that specific module. However, if a third-party vulnerability creates a direct risk to a Contrast project, please let us know.
51+
52+
## Learning More
53+
54+
To learn more about securing your applications with Contrast, please visit [our documentation](https://docs.contrastsecurity.com/?lang=en).

0 commit comments

Comments
 (0)