You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Wrap security so it respects Node.js linter (#2610)
* Wrap security so it respects Node.js linter
It doesn't matter here, but to keep this file textually identical to the
policy in Node.js, the markdown needs to lint clean.
See: nodejs/node#29682
* Update locale/en/security.md
Co-Authored-By: Richard Lau <[email protected]>
* Update locale/en/security.md
Co-Authored-By: Richard Lau <[email protected]>
Copy file name to clipboardExpand all lines: locale/en/security.md
+43-30Lines changed: 43 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,59 +9,72 @@ title: Security
9
9
10
10
Report security bugs in Node.js via [HackerOne](https://hackerone.com/nodejs).
11
11
12
-
Your report will be acknowledged within 24 hours, and you’ll receive a more detailed response to your report within 48
13
-
hours indicating the next steps in handling your submission.
12
+
Your report will be acknowledged within 24 hours, and you’ll receive a more
13
+
detailed response to your report within 48 hours indicating the next steps in
14
+
handling your submission.
14
15
15
-
After the initial reply to your report, the security team will endeavor to keep you informed of the progress being made
16
-
towards a fix and full announcement, and may ask for additional information or guidance surrounding the reported issue.
17
-
These updates will be sent at least every five days; in practice, this is more likely to be every 24-48 hours.
16
+
After the initial reply to your report, the security team will endeavor to keep
17
+
you informed of the progress being made towards a fix and full announcement,
18
+
and may ask for additional information or guidance surrounding the reported
19
+
issue. These updates will be sent at least every five days; in practice, this
20
+
is more likely to be every 24-48 hours.
18
21
19
22
### Node.js Bug Bounty Program
20
23
21
-
The Node.js project engages in an official bug bounty program for security researchers and responsible public disclosures.
22
-
The program is managed through the HackerOne platform. See <https://hackerone.com/nodejs> for further details.
24
+
The Node.js project engages in an official bug bounty program for security
25
+
researchers and responsible public disclosures. The program is managed through
26
+
the HackerOne platform. See <https://hackerone.com/nodejs> for further details.
23
27
24
28
## Reporting a Bug in a third party module
25
29
26
-
Security bugs in third party modules should be reported to their respective maintainers and should also be coordinated
27
-
through the Node Ecosystem Security Team via [HackerOne](https://hackerone.com/nodejs-ecosystem).
30
+
Security bugs in third party modules should be reported to their respective
31
+
maintainers and should also be coordinated through the Node Ecosystem Security
32
+
Team via [HackerOne](https://hackerone.com/nodejs-ecosystem).
28
33
29
-
Details regarding this process can be found in the [Security Working Group repository](https://github.com/nodejs/security-wg/blob/master/processes/third_party_vuln_process.md).
34
+
Details regarding this process can be found in the
35
+
[Security Working Group repository](https://github.com/nodejs/security-wg/blob/master/processes/third_party_vuln_process.md).
30
36
31
-
Thank you for improving the security of Node.js and its ecosystem. Your efforts and responsible disclosure are greatly
32
-
appreciated and will be acknowledged.
37
+
Thank you for improving the security of Node.js and its ecosystem. Your efforts
38
+
and responsible disclosure are greatly appreciated and will be acknowledged.
33
39
34
40
## Disclosure Policy
35
41
36
42
Here is the security disclosure policy for Node.js
37
43
38
-
- The security report is received and is assigned a primary handler. This person will coordinate the fix and release
39
-
process. The problem is confirmed and a list of all affected versions is determined. Code is audited to find any
40
-
potential similar problems. Fixes are prepared for all releases which are still under maintenance. These fixes are not
41
-
committed to the public repository but rather held locally pending the announcement.
44
+
* The security report is received and is assigned a primary handler. This
45
+
person will coordinate the fix and release process. The problem is confirmed
46
+
and a list of all affected versions is determined. Code is audited to find
47
+
any potential similar problems. Fixes are prepared for all releases which are
48
+
still under maintenance. These fixes are not committed to the public
49
+
repository but rather held locally pending the announcement.
42
50
43
-
- A suggested embargo date for this vulnerability is chosen and a CVE (Common Vulnerabilities and Exposures (CVE®))
44
-
is requested for the vulnerability.
51
+
* A suggested embargo date for this vulnerability is chosen and a CVE (Common
52
+
Vulnerabilities and Exposures (CVE®)) is requested for the vulnerability.
45
53
46
-
- On the embargo date, the Node.js security mailing list is sent a copy of the announcement. The changes are pushed to
47
-
the public repository and new builds are deployed to nodejs.org. Within 6 hours of the mailing list being notified, a
48
-
copy of the advisory will be published on the Node.js blog.
54
+
* On the embargo date, the Node.js security mailing list is sent a copy of the
55
+
announcement. The changes are pushed to the public repository and new builds
56
+
are deployed to nodejs.org. Within 6 hours of the mailing list being
57
+
notified, a copy of the advisory will be published on the Node.js blog.
49
58
50
-
- Typically the embargo date will be set 72 hours from the time the CVE is issued. However, this may vary depending on
51
-
the severity of the bug or difficulty in applying a fix.
59
+
* Typically the embargo date will be set 72 hours from the time the CVE is
60
+
issued. However, this may vary depending on the severity of the bug or
61
+
difficulty in applying a fix.
52
62
53
-
- This process can take some time, especially when coordination is required with maintainers of other projects. Every
54
-
effort will be made to handle the bug in as timely a manner as possible; however, it’s important that we follow the
55
-
release process above to ensure that the disclosure is handled in a consistent manner.
63
+
* This process can take some time, especially when coordination is required
64
+
with maintainers of other projects. Every effort will be made to handle the
65
+
bug in as timely a manner as possible; however, it’s important that we follow
66
+
the release process above to ensure that the disclosure is handled in a
67
+
consistent manner.
56
68
57
69
## Receiving Security Updates
58
70
59
71
Security notifications will be distributed via the following methods.
60
72
61
-
-<https://groups.google.com/group/nodejs-sec>
62
-
-<https://nodejs.org/en/blog/>
73
+
*<https://groups.google.com/group/nodejs-sec>
74
+
*<https://nodejs.org/en/blog/>
63
75
64
76
## Comments on this Policy
65
77
66
-
If you have suggestions on how this process could be improved please submit a [pull request](https://github.com/nodejs/nodejs.org)
67
-
or [file an issue](https://github.com/nodejs/security-wg/issues/new) to discuss.
78
+
If you have suggestions on how this process could be improved please submit a
79
+
[pull request](https://github.com/nodejs/nodejs.org) or
80
+
[file an issue](https://github.com/nodejs/security-wg/issues/new) to discuss.
0 commit comments