Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
37 changes: 37 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
# Security Policy

DFINITY takes the security of our software products seriously, which includes all source code repositories under the [DFINITY](https://github.com/dfinity) GitHub organization.

> [!IMPORTANT]
> [DFINITY Foundation](https://dfinity.org) has an [Internet Computer (ICP) Bug Bounty program](https://dfinity.org/bug-bounty/) that rewards researchers for finding and reporting vulnerabilities in the Internet Computer. Please check the scope and eligibility criteria outlined in the policy to see if the vulnerability you found qualifies for a reward.

## How to report a vulnerability

We appreciate your help in keeping our projects secure.
If you believe you have found a security vulnerability in any of our repositories, please report it responsibly to us as described below:

1. **Do not disclose the vulnerability publicly.** Public disclosure could be exploited by attackers before it can be fixed.
2. **Send an email to securitybugs@dfinity.org.** Please include the following information in your email:
* A description of the vulnerability
* Steps to reproduce the vulnerability
* Risk rating of the vulnerability
* Any other relevant information

We will respond to your report within 72 hours and work with you to fix the vulnerability as soon as possible.

### Security Updates

We are committed to fixing security vulnerabilities in a timely manner. Once a security vulnerability is reported, we will:

* Investigate the report and confirm the vulnerability.
* Develop a fix for the vulnerability.
* Release a new version of the project that includes the fix.
* Announce the security fix in the project's release notes.

## Preferred Language

We prefer all communications to be in English.

## Disclaimer

This security policy is subject to change at any time.
2 changes: 1 addition & 1 deletion biome.json
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"$schema": "https://biomejs.dev/schemas/2.4.7/schema.json",
"$schema": "https://biomejs.dev/schemas/2.4.8/schema.json",
"vcs": {
"enabled": true,
"clientKind": "git",
Expand Down
11 changes: 10 additions & 1 deletion package.json
Original file line number Diff line number Diff line change
Expand Up @@ -69,13 +69,22 @@
"@types/node": "^24.12.0",
"memfs": "^4.57.1",
"publint": "^0.3.18",
"tinyglobby": "^0.2.15",
"tinyglobby": "^0.2.16",
"typescript": "^5.9.3",
"vite": "^8.0.2",
"vitest": "4.1.0",
"wasm-pack": "^0.14.0"
},
"dependencies": {
"commander": "^14.0.3"
},
"pnpm": {
"overrides": {
"axios": ">=1.15.0",
"lodash": ">=4.18.0",
"tar": ">=7.5.11",
"minimatch": ">=10.2.5",
"ajv": ">=8.18.0"
Comment on lines +83 to +87
Copy link

Copilot AI Apr 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overrides for axios, ajv, and minimatch now exist in both pnpm-workspace.yaml and package.json with different minimum versions. This duplication/conflict makes it unclear which constraint is authoritative and can lead to unexpected resolution changes. Consider consolidating overrides into a single source of truth (preferably package.json under pnpm.overrides if that’s the intended standard) and removing or updating the other location to match exactly.

Suggested change
"axios": ">=1.15.0",
"lodash": ">=4.18.0",
"tar": ">=7.5.11",
"minimatch": ">=10.2.5",
"ajv": ">=8.18.0"
"lodash": ">=4.18.0",
"tar": ">=7.5.11"

Copilot uses AI. Check for mistakes.
}
}
Comment on lines +81 to 89
Copy link

Copilot AI Apr 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The PR description says these overrides “pin” vulnerable transitive deps, but the overrides are expressed as minimum ranges (>=). If the intent is truly to pin (ensure a single known-safe version), use exact versions. If the intent is “enforce minimum safe versions,” consider updating the PR description accordingly (and optionally add a short note on why minimum ranges are preferred here).

Copilot uses AI. Check for mistakes.
}
Loading
Loading