Skip to content

Commit 3e19298

Browse files
committed
Add Security file.
1 parent a9a55d8 commit 3e19298

File tree

2 files changed

+46
-0
lines changed

2 files changed

+46
-0
lines changed

README.md

+9
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,15 @@ Install ApiProblem like any other Composer package:
8585

8686
See the [Composer documentation][2] for more details.
8787

88+
## Security
89+
90+
If you discover any security related issues, please use the [GitHub security reporting form](https://github.com/Crell/ApiProblem/security) rather than the issue queue.
91+
92+
## Credits
93+
94+
- [Larry Garfield][link-author]
95+
- [All Contributors][link-contributors]
96+
8897
## License
8998

9099
This library is released under the MIT license. In short, "leave the copyright statement intact, otherwise have fun." See LICENSE for more information.

SECURITY.md

+37
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
# Brand Promise
2+
3+
Perfect security is not an achievable goal, but it is a goal to strive for nonetheless. To that end, we welcome responsible security reports from both users and external security researchers.
4+
5+
# Scope
6+
7+
If you believe you've found a security issue in software that is maintained in this repository, we encourage you to notify us.
8+
9+
| Version | In scope | Source code |
10+
| ------- | -------- |-------------------------------------|
11+
| latest || https://github.com/Crell/ApiProblem |
12+
13+
Only the latest stable release of this library is supported. In general, bug and security fixes will not be backported unless there is a substantial imminent threat to users in not doing so.
14+
15+
# How to Submit a Report
16+
17+
To submit a vulnerability report, please contact us through [GitHub](https://github.com/Crell/ApiProblem/security). Your submission will be reviewed as soon as feasible, but as this is a volunteer project we cannot guarantee a response time.
18+
19+
# Safe Harbor
20+
21+
We support safe harbor for security researchers who:
22+
23+
* Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services.
24+
* Only interact with accounts you own or with explicit permission of the account holder. If you do encounter Personally Identifiable Information (PII) contact us immediately, do not proceed with access, and immediately purge any local information.
25+
* Provide us with a reasonable amount of time to resolve vulnerabilities prior to any disclosure to the public or a third-party.
26+
27+
We will consider activities conducted consistent with this policy to constitute "authorized" conduct and will not pursue civil action or initiate a complaint to law enforcement. We will help to the extent we can if legal action is initiated by a third party against you.
28+
29+
Please submit a report to us before engaging in conduct that may be inconsistent with or unaddressed by this policy.
30+
31+
# Preferences
32+
33+
* Please provide detailed reports with reproducible steps and a clearly defined impact.
34+
* Include the version number of the vulnerable package in your report.
35+
* Providing a suggested fix is welcome, but not required, and we may choose to implement our own, based on your submitted fix or not.
36+
* This is a volunteer project. We will make every effort to respond to security reports in a timely manner, but that may be a week or two on the first contact.
37+

0 commit comments

Comments
 (0)