Skip to content

Commit a02a883

Browse files
docs:feat - Security Policies (#107)
Signed-off-by: Lucas Bruno Ferreira <lucas.bruno@zup.com.br>
1 parent 16e0f61 commit a02a883

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed

SECURITY.md

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
# **Security Policies**
2+
3+
Zup's Open Source projects adopt recommendations from the **OpenSSF Security Scorecards** and the **OpenSSF Best Practices Badge** program. Our projects must have a public policy for security vulnerabilities disclosure.
4+
5+
## **Supported versions**
6+
7+
|Version |Supported |
8+
|--- |--- |
9+
|Latest branch version |Yes |
10+
|Other versions |No |
11+
12+
### **Private Disclosure Process of Vulnerabilities**
13+
14+
Zup's Open Source Engineering team and its product communities care about reported security vulnerabilities.
15+
16+
Our community request that every suspected vulnerability are disclosed privately and responsibly.
17+
If you find a vulnerability or even a possible one, follow the instructions:
18+
19+
**1.** Send us an e-mail to **secure.opensource@zup.com.br**. You need to add the information below:
20+
21+
- Type of vulnerability (for example Buffer Overflow, SQL Injection, Cross-Site Scripting, etc.).
22+
- Full paths of the source files related to the vulnerability manifestation.
23+
- The location of the affected source code (tag/branch/commit or direct URL).
24+
- Step-by-step instructions to reproduce the problem and you can also add any special configuration required to it.
25+
- Proof-of-concept or exploit code (if possible).
26+
- The impact of the problem, including how an attacker might exploit the vulnerability.
27+
28+
**2.** The **Horusec** team will acknowledge your e-mail and they will send you a more detailed response indicating the next steps to handle the vulnerability you have reported.
29+
30+
**3.** The **Horusec** team will keep you informed about the progress of the fix and its public disclosure. They may ask you for additional information.
31+
32+
### **Public Disclosure Process of Vulnerabilities**
33+
34+
If you become aware of a publicly disclosed vulnerability, please IMMEDIATELY send an e-mail to secure.opensource@zup.com.br, informing the **Horusec** team about it so they can address it via analysis, fix, new versioning, and release.
35+
36+
Whenever is possible, the **Horusec** team may request the person who made the vulnerability's public disclosure to address it through a private process, for example, if details about exploiting the flaw are not available yet.
37+
38+
### **Disclosure Policy**
39+
40+
When the **Horusec** team receives a vulnerability report, a team member is assigned as a primary handler. This person will contact the product's Tech Lead to coordinate the bug fix and new fixed version release process, see the steps of this process below:
41+
42+
**Step 1.** Confirm the issue and determine if the supported version is affected;
43+
44+
**Step 2.** Audit code to find similar issues;
45+
46+
**Step 3.** Prepare fixes for the supported version. These fixes will be released as soon as possible.
47+
48+
### **Community**
49+
50+
If you have any suggestions on how we can improve this process, please submit a pull request and contribute to the project too!

0 commit comments

Comments
 (0)