Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit e69788b

Browse files
authored
Add SECURITY.md
given the catastrophic way TALOS Intelligence "communicated" with upstream (i.e. by probably sending a single mail to an unused email address), it's probably best to explicitly document how to approach upstream when a security issue is discovered.
1 parent 12a8484 commit e69788b

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed

SECURITY.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
# Security Policy
2+
3+
## Supported Versions
4+
5+
| Version | Supported |
6+
| --------- | ------------------ |
7+
| 1.11.x | :white_check_mark: |
8+
| <= 1.10.x | :x: |
9+
10+
## Reporting a Vulnerability
11+
12+
Open a public issue on github. The issue will most likely be fixed
13+
within a day, unless all maintainers happen to just be taking a
14+
vacation at the same time, which is unlikely.
15+
16+
Even then, having the bug publicly known will allow competent people
17+
to come up with custom patches for distros, most likely quicker
18+
than black hats can craft a remote execution exploit.
19+
20+
If you really really do not want to make the issue public, come
21+
to the tinyproxy IRC channel and ask for a maintainer, which you
22+
can then contact via private messages.
23+
24+
Do not, however, like ["TALOS Intelligence"](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889)
25+
pull a random email address out of git log, then send an email
26+
nobody reads or responds to, and wait for 6 months for publication.
27+
this only gives black hats plenty time to sell, use and circulate
28+
zero days and get the best possible ROI.

0 commit comments

Comments
 (0)