Skip to content

Adding Microsoft SECURITY.MD#2

Merged
imran-siddique merged 2 commits intomainfrom
users/GitHubPolicyService/b5fcb941-274a-4daf-a8af-012ebf9d2fb7
Mar 4, 2026
Merged

Adding Microsoft SECURITY.MD#2
imran-siddique merged 2 commits intomainfrom
users/GitHubPolicyService/b5fcb941-274a-4daf-a8af-012ebf9d2fb7

Conversation

@microsoft-github-policy-service
Copy link
Copy Markdown

Please accept this contribution adding the standard Microsoft SECURITY.MD 🔒 file to help the community understand the security policy and how to safely report security issues. GitHub uses the presence of this file to light-up security reminders and a link to the file. This pull request commits the latest official SECURITY.MD file from https://github.com/microsoft/repo-templates/blob/main/shared/SECURITY.md.

Microsoft teams can learn more about this effort and share feedback within the open source guidance available internally.

imran-siddique added a commit that referenced this pull request Mar 4, 2026
Comprehensive proposal documents for each standards body and
framework integration submission:

- LFAI-PROPOSAL.md — LF AI & Data Foundation Sandbox (PR #102)
- COSAI-WS4-PROPOSAL.md — CoSAI/OASIS WS4 RFC (Issue #42)
- OWASP-ASI-PROPOSAL.md — OWASP ASI code samples (PR #2)
- MAF-INTEGRATION-PROPOSAL.md — Microsoft Agent Framework (Issue #4440)
- GOOGLE-ADK-PROPOSAL.md — Google ADK GovernancePlugin (Issue #4543)
- OPENLIT-INTEGRATION-PROPOSAL.md — OpenLit instrumentation (PR #1037)

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@imran-siddique imran-siddique merged commit c1bee01 into main Mar 4, 2026
16 checks passed
@imran-siddique imran-siddique deleted the users/GitHubPolicyService/b5fcb941-274a-4daf-a8af-012ebf9d2fb7 branch March 12, 2026 19:53
imran-siddique added a commit that referenced this pull request Apr 1, 2026
… 37 files) (#684)

* fix(security): eliminate CI injection vectors and pin actions (#1)

- Move all github.event.* expressions from run: to env: blocks (CWE-94)
  - spell-check.yml: changed_files via env var
  - markdown-link-check.yml: changed_files via temp file input
  - ai-spec-drafter.yml: issue.number via env var
  - ai-test-generator.yml: pull_request.number via env var
  - ai-release-notes.yml: release.tag_name via env var
  - sbom.yml: release.tag_name via env var
- Redact secret scanner output to prevent secret leaks to CI logs (CWE-200)
- SHA-pin dtolnay/rust-toolchain (the only unpinned action) (CWE-829)
- Add missing permissions: block to markdown-link-check.yml (CWE-250)

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

* fix(security): supply chain hardening — dep confusion, lockfiles, Dockerfile digest (#2)

- Fix dependency confusion: replace agent-primitives==0.1.0 with local
  file references in scak and iatp requirements.txt (CWE-427)
- Pin root Dockerfile base image to SHA digest (CWE-829)
- Generate missing package-lock.json for 4 npm packages (CWE-829):
  mcp-proxy, api, chrome extension, mastra-agentmesh
- Remove unsafe npm ci || npm install fallback in ESRP pipeline (CWE-829)

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

* fix(security): Docker/infra hardening — CORS, Grafana, .dockerignore, CODEOWNERS (#3)

- Replace hardcoded Grafana admin passwords with env var refs in 7
  docker-compose files (CWE-798)
- Replace wildcard CORS allow_origins=[*] with env-driven origins
  in 6 production services (CWE-942)
- Add secret exclusion patterns (.env, *.key, *.pem, *.p12) to root
  and caas .dockerignore files (CWE-532)
- Add security contact, supported versions, and 90-day disclosure
  policy to SECURITY.md (CWE-693)
- Add CODEOWNERS rules for scripts/, Dockerfile, docker-compose*,
  .dockerignore, .clusterfuzzlite/ (CWE-862)

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

* fix(security): code quality — XSS, Rust panics, example warnings (#4)

- Replace innerHTML with safe DOM APIs (textContent, createElement)
  in PolicyEditorPanel.ts and MetricsDashboardPanel.ts (CWE-79)
- Add HTML entity escaping for violation names in metrics dashboard
- Replace .unwrap() with .expect() on production RwLock/Mutex calls
  in policy.rs for clearer panic messages (CWE-252)
- Add INTENTIONALLY INSECURE warnings to test fixture code in
  github-reviewer example to prevent copy-paste propagation

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>

---------

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant