Skip to content

Commit b3b9bbc

Browse files
committed
fixup! doc: add constraints for mem leak to threat model
1 parent 666abb3 commit b3b9bbc

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

SECURITY.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,8 +112,14 @@ does not trust is considered a vulnerability:
112112
* Memory leaks qualify as vulnerabilities when all of the following criteria are met:
113113
* The API is being correctly used
114114
* The API doesn't have a warning against its usage in a production environment
115+
* The API is public and documented
115116
* The API is on stable (2.0) status
116117
* The memory leak is significant, causing a DoS fast or in a user-uncontrolled space (for instance, on HTTP parsing)
118+
* The memory leak is directly exploitable by an untrusted source without requiring application mistakes
119+
* The leak cannot be reasonably mitigated through standard operational practices (like process recycling)
120+
* The leak occurs deterministically under normal usage patterns rather than edge cases
121+
* The leak occurs at a rate that would cause practical resource exhaustion within X requests or Y hours under
122+
typical workloads
117123

118124
If Node.js loads configuration files or runs code by default (without a
119125
specific request from the user), and this is not documented, it is considered a

0 commit comments

Comments
 (0)