|
| 1 | +# Security Policy |
| 2 | + |
| 3 | +## Reporting a Vulnerability |
| 4 | + |
| 5 | +We take security vulnerabilities seriously. If you discover a security vulnerability in Tiles, please report it to us responsibly. |
| 6 | + |
| 7 | +### How to Report |
| 8 | + |
| 9 | +**We encourage you to use GitHub's Security Advisory feature** to report vulnerabilities privately: |
| 10 | + |
| 11 | +1. Go to the [Security tab](https://github.com/tilesprivacy/tiles/security) in this repository |
| 12 | +2. Click on **"Report a vulnerability"** or **"Advisories"** |
| 13 | +3. Click **"New draft security advisory"** |
| 14 | +4. Fill out the security advisory form with: |
| 15 | + - A clear description of the vulnerability |
| 16 | + - Steps to reproduce the issue |
| 17 | + - Potential impact and severity assessment |
| 18 | + - Any suggested fixes or mitigations |
| 19 | + |
| 20 | +Alternatively, you can report vulnerabilities by emailing [**security@tiles.run**](mailto:security@tiles.run) with: |
| 21 | +- A detailed description of the vulnerability |
| 22 | +- Steps to reproduce the issue |
| 23 | +- Potential impact assessment |
| 24 | +- Your contact information |
| 25 | + |
| 26 | +### What to Include |
| 27 | + |
| 28 | +When reporting a vulnerability, please provide: |
| 29 | + |
| 30 | +- **Description**: A clear description of the security issue |
| 31 | +- **Steps to Reproduce**: Detailed steps to reproduce the vulnerability |
| 32 | +- **Impact**: The potential impact if this vulnerability is exploited |
| 33 | +- **Severity**: Your assessment of the severity (Critical, High, Medium, Low) |
| 34 | +- **Affected Versions**: Which versions of Tiles are affected |
| 35 | +- **Suggested Fix**: If you have ideas for how to fix the issue (optional but appreciated) |
| 36 | + |
| 37 | +### Response Timeline |
| 38 | + |
| 39 | +We aim to: |
| 40 | + |
| 41 | +- **Acknowledge** your report within 48 hours |
| 42 | +- **Triage** the vulnerability within 7 days |
| 43 | +- **Provide updates** on our progress regularly |
| 44 | +- **Resolve** critical vulnerabilities as quickly as possible |
| 45 | + |
| 46 | +### Disclosure Policy |
| 47 | + |
| 48 | +- We will work with you to coordinate public disclosure after the vulnerability has been addressed |
| 49 | +- We will credit you in our security advisories (unless you prefer to remain anonymous) |
| 50 | +- We will not disclose your report publicly until a fix is available |
| 51 | + |
| 52 | +### Security Best Practices |
| 53 | + |
| 54 | +When testing for vulnerabilities: |
| 55 | + |
| 56 | +- **Do not** access or modify user data without permission |
| 57 | +- **Do not** perform any actions that could harm users or their systems |
| 58 | +- **Do not** violate any laws or breach any agreements |
| 59 | +- **Do** act in good faith and follow responsible disclosure practices |
| 60 | + |
| 61 | +## Security Updates |
| 62 | + |
| 63 | +Security updates will be released as soon as possible after a vulnerability is confirmed and fixed. We recommend: |
| 64 | + |
| 65 | +- Keeping Tiles updated to the latest version |
| 66 | +- Subscribing to the [Tiles blog](https://tiles.run/blog) for important security updates |
| 67 | + |
| 68 | +## Questions? |
| 69 | + |
| 70 | +If you have questions about this security policy, please contact us at [**security@tiles.run**](mailto:security@tiles.run). |
| 71 | + |
| 72 | +Thank you for helping keep Tiles secure! |
0 commit comments