This document outlines security procedures and general policies for Open Source projects as found on https://github.com/willfarrell.
Our goal is to ensure OSS follows secure design principles and meets security best practices as outlined by the following OWASP ASVS v5.0 Level 3.
Standards are evaluated using automated scans (Linting, Unit tests, SAST, SCA, DAST, Perf) and manual self-audits. 3rd party audits are welcome.
- secure by default
- use white lists
- no backdoors
- follow least privilege
- keep it simple
Only the latest major version is supported for security updates.
The core OSS team and community take all security vulnerabilities seriously. Thank you for improving the security of our open source software. We appreciate your efforts and responsible disclosure and will make every effort to acknowledge your contributions.
Report security vulnerabilities by emailing the lead maintainer at:
willfarrell@proton.me
This email address does support PGP.
The lead maintainer will acknowledge your email within 14 days, and will send a more detailed response within the following 48 hours indicating the next steps in handling your report. After the initial reply to your report, the security team will endeavour to keep you informed of the progress towards a fix and full announcement, and may ask for additional information or guidance. We will try to have a fix completed as soon as possible, but no longer than 60 days. Credit, if requested, can be included within the release notes.
Report security vulnerabilities in third-party modules to the person or team maintaining the module.
When the security team receives a security bug report, they will assign it to a primary handler. This person will coordinate the fix and release process, involving the following steps:
- Confirm the problem and determine the affected versions.
- Audit code to find any potential similar problems.
- Prepare fixes for all releases still under maintenance. These fixes will be released as fast as possible.