Skip to content

Commit

Permalink
[docs] Add note for use of SecurityEmbargo label in security sheriff
Browse files Browse the repository at this point in the history
docs.

I saw a use of this tag during martinkr@'s sheriffing shift that I
didn't see referenced in the sheriffing documents, but which made good
sense to me and should probably be standard practice (adding this label
for potential malware samples).  Updating sheriffing docs accordingly.

Change-Id: Ia08ba9ffe41fe85d10e86a3a56764a413a3c4549
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/4246662
Commit-Queue: Julia Hansbrough <flowerhack@google.com>
Reviewed-by: Martin Kreichgauer <martinkr@google.com>
Cr-Commit-Position: refs/heads/main@{#1105422}
  • Loading branch information
flowerhack authored and Chromium LUCI CQ committed Feb 15, 2023
1 parent aabb1aa commit bdf7856
Showing 1 changed file with 4 additions and 2 deletions.
6 changes: 4 additions & 2 deletions docs/security/sheriff.md
Original file line number Diff line number Diff line change
Expand Up @@ -336,8 +336,10 @@ was filed using the Security template):

* **Restrict-View-SecurityTeam**
* **Type-Bug-Security**
* **If the reporter wants to remain anonymous or if the bug description or
comments contain PII**, add **Restrict-View-SecurityEmbargo**.
* If you want to prevent the bug from becoming unrestricted after it has been
closed, add **Restrict-View-SecurityEmbargo**. This should be done if the
reporter wishes to remain anonymous, if the description or comments contain
PII, or if the bug contains malware samples.
* **Security_Severity** - your responsibility as Sheriff.
* **FoundIn** - your responsibility as Sheriff.
* **reward_to** - if the bug was filed internally on behalf of somebody
Expand Down

0 comments on commit bdf7856

Please sign in to comment.