|
2 | 2 |
|
3 | 3 | ## Reporting a Vulnerability |
4 | 4 |
|
5 | | -We take security seriously. If you discover a security vulnerability, please report it responsibly. |
| 5 | +Please report security vulnerabilities privately. |
6 | 6 |
|
7 | | -### How to Report |
| 7 | +1. Do **not** open a public issue. |
| 8 | +2. Use GitHub Private Vulnerability Reporting in the affected repository (`Security` tab). |
| 9 | +3. If needed, contact us at **security@sqloot.dev**. |
8 | 10 |
|
9 | | -1. **DO NOT** create a public GitHub issue |
10 | | -2. **Preferred**: Use [GitHub's private vulnerability reporting](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability) on the affected repository's Security tab |
11 | | -3. **Alternative**: Email: security@sqloot.dev |
12 | | -4. Include: |
13 | | - - Description of the vulnerability |
14 | | - - Steps to reproduce |
15 | | - - Potential impact |
16 | | - - Any suggested fixes (optional) |
| 11 | +Please include: |
| 12 | +- Affected repository/package and version/commit |
| 13 | +- Reproduction steps or PoC |
| 14 | +- Impact assessment |
| 15 | +- Suggested mitigation (optional) |
17 | 16 |
|
18 | | -### What to Expect |
| 17 | +## Response Targets |
19 | 18 |
|
20 | | -- **Acknowledgment**: Within 48 hours |
21 | | -- **Initial assessment**: Within 7 days |
22 | | -- **Resolution timeline**: Depends on severity (critical: ASAP, high: 30 days, medium: 90 days) |
| 19 | +- Acknowledgement: within 48 hours |
| 20 | +- Initial triage: within 7 days |
| 21 | +- Fix timeline: |
| 22 | + - Critical: as soon as possible |
| 23 | + - High: target within 30 days |
| 24 | + - Medium: target within 90 days |
23 | 25 |
|
24 | | -### Scope |
| 26 | +## Scope |
25 | 27 |
|
26 | | -This policy applies to all SQLoot repositories. |
27 | | - |
28 | | -### Recognition |
29 | | - |
30 | | -We appreciate responsible disclosure and will acknowledge security researchers in our release notes (unless you prefer to remain anonymous). |
| 28 | +This policy applies to all repositories under the SQLoot organization. |
31 | 29 |
|
32 | 30 | ## Supported Versions |
33 | 31 |
|
34 | | -| Version | Supported | |
35 | | -| -------- | ----------------------- | |
36 | | -| Latest | ✅ | |
37 | | -| < Latest | ❌ (upgrade recommended) | |
38 | | - |
39 | | -## Security Best Practices |
| 32 | +| Version line | Supported | |
| 33 | +| --- | --- | |
| 34 | +| Current main/default branch | ✅ | |
| 35 | +| Older versions | ❌ | |
40 | 36 |
|
41 | | -When contributing to SQLoot projects: |
| 37 | +## Contributor Security Requirements |
42 | 38 |
|
43 | | -- Never commit secrets, API keys, or credentials |
44 | | -- Use environment variables for sensitive data |
45 | | -- Keep dependencies up to date |
46 | | -- Follow secure coding practices |
| 39 | +- Never commit secrets or credentials |
| 40 | +- Minimize sensitive logging |
| 41 | +- Keep dependencies updated |
| 42 | +- Use least-privilege tokens and permissions |
47 | 43 | - Enable 2FA on your GitHub account |
48 | 44 |
|
49 | | -## Security.txt |
50 | | - |
51 | | -For automated security tools, we follow [RFC 9116](https://www.rfc-editor.org/rfc/rfc9116.html). |
52 | | -See `/.well-known/security.txt` in production deployments. |
53 | | - |
54 | | ---- |
| 45 | +## Coordinated Disclosure |
55 | 46 |
|
56 | | -<div align="center"> |
57 | | - <a href="https://github.com/enterprises/ownCTRL"><img src="https://img.shields.io/badge/©️_2026-ownCTRL™-333?style=flat&labelColor=ddd" alt="© 2026 ownCTRL™"/></a> |
58 | | - <a href="https://github.com/miccy"><img src="https://img.shields.io/badge/⚙️_Maintained_with_🩶_by-%40miccy-333?style=flat&labelColor=ddd" alt="Maintained by @miccy"/></a> |
59 | | -</div> |
| 47 | +We appreciate responsible disclosure and can credit reporters in release notes, unless anonymity is requested. |
0 commit comments