If you think you have found a potential security vulnerability in checkov
,
please email psirt@paloaltonetworks.com directly. Do not file a public issue. If
English is not your first language, please try to describe the problem
and its impact to the best of your ability. For greater detail, please
use your native language and we will try our best to translate it using
online services.
Please also include the code you used to find the problem and the shortest amount of code necessary to reproduce it.
Please do not disclose this to anyone else. We will retrieve a CVE identifier if necessary and give you full credit under whatever name or alias you provide. We will only request an identifier when we have a fix and can publish it in a release.
We will respect your privacy and will only publicize your involvement if you grant us permission.
This following information discusses the process the checkov
project
follows in response to vulnerability disclosures. If you are disclosing
a vulnerability, this section of the documentation lets you know how we
will respond to your disclosure.
When you report an issue, one of the project members will respond to you within few days. This initial response will at the very least confirm receipt of the report.
If we were able to rapidly reproduce the issue, the initial response will also contain confirmation of the issue. If we are not, we will often ask for more information about the reproduction scenario.
Our goal is to have a fix for any vulnerability released within two weeks of the initial disclosure. This may potentially involve shipping an interim release that simply disables function while a more mature fix can be prepared, but will in the vast majority of cases mean shipping a complete release as soon as possible.
Throughout the fix process we will keep you up to speed with how the fix is progressing. Once the fix is prepared, we will notify you that we believe we have a fix. Often we will ask you to confirm the fix resolves the problem in your environment, especially if we are not confident of our reproduction scenario.
At this point, we will prepare for the release. We will obtain a CVE number if one is required, providing you with full credit for the discovery. We will also decide on a planned release date, and let you know when it is.
On release day, we will push the patch to our public repository, along with an updated changelog that describes the issue. The change log is generated automatically from commit messages. We will then issue a PyPI release containing the patch.
At this point, we will publicise the release. This will involve announcement on our Slack channel (https://codifiedsecurity.slack.com) and all other communication mechanisms available to the core team.
We will also explicitly mention which commits contain the fix to make it
easier for other distributors and users to easily patch their own
versions of checkov
if upgrading is not an option.