-
Notifications
You must be signed in to change notification settings - Fork 2
chore(security): harden dependency supply chain and add security policy #138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,37 @@ | ||
| # Security Policy | ||
|
|
||
| DFINITY takes the security of our software products seriously, which includes all source code repositories under the [DFINITY](https://github.com/dfinity) GitHub organization. | ||
|
|
||
| > [!IMPORTANT] | ||
| > [DFINITY Foundation](https://dfinity.org) has an [Internet Computer (ICP) Bug Bounty program](https://dfinity.org/bug-bounty/) that rewards researchers for finding and reporting vulnerabilities in the Internet Computer. Please check the scope and eligibility criteria outlined in the policy to see if the vulnerability you found qualifies for a reward. | ||
|
|
||
| ## How to report a vulnerability | ||
|
|
||
| We appreciate your help in keeping our projects secure. | ||
| If you believe you have found a security vulnerability in any of our repositories, please report it responsibly to us as described below: | ||
|
|
||
| 1. **Do not disclose the vulnerability publicly.** Public disclosure could be exploited by attackers before it can be fixed. | ||
| 2. **Send an email to securitybugs@dfinity.org.** Please include the following information in your email: | ||
| * A description of the vulnerability | ||
| * Steps to reproduce the vulnerability | ||
| * Risk rating of the vulnerability | ||
| * Any other relevant information | ||
|
|
||
| We will respond to your report within 72 hours and work with you to fix the vulnerability as soon as possible. | ||
|
|
||
| ### Security Updates | ||
|
|
||
| We are committed to fixing security vulnerabilities in a timely manner. Once a security vulnerability is reported, we will: | ||
|
|
||
| * Investigate the report and confirm the vulnerability. | ||
| * Develop a fix for the vulnerability. | ||
| * Release a new version of the project that includes the fix. | ||
| * Announce the security fix in the project's release notes. | ||
|
|
||
| ## Preferred Language | ||
|
|
||
| We prefer all communications to be in English. | ||
|
|
||
| ## Disclaimer | ||
|
|
||
| This security policy is subject to change at any time. |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -69,13 +69,22 @@ | |
| "@types/node": "^24.12.0", | ||
| "memfs": "^4.57.1", | ||
| "publint": "^0.3.18", | ||
| "tinyglobby": "^0.2.15", | ||
| "tinyglobby": "^0.2.16", | ||
| "typescript": "^5.9.3", | ||
| "vite": "^8.0.2", | ||
| "vitest": "4.1.0", | ||
| "wasm-pack": "^0.14.0" | ||
| }, | ||
| "dependencies": { | ||
| "commander": "^14.0.3" | ||
| }, | ||
| "pnpm": { | ||
| "overrides": { | ||
| "axios": ">=1.15.0", | ||
| "lodash": ">=4.18.0", | ||
| "tar": ">=7.5.11", | ||
| "minimatch": ">=10.2.5", | ||
| "ajv": ">=8.18.0" | ||
| } | ||
| } | ||
|
Comment on lines
+81
to
89
|
||
| } | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overrides for
axios,ajv, andminimatchnow exist in bothpnpm-workspace.yamlandpackage.jsonwith different minimum versions. This duplication/conflict makes it unclear which constraint is authoritative and can lead to unexpected resolution changes. Consider consolidating overrides into a single source of truth (preferablypackage.jsonunderpnpm.overridesif that’s the intended standard) and removing or updating the other location to match exactly.